This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Delivered-To: [email protected] | |
| Received: by 2002:a05:7000:6788:0:0:0:0 with SMTP id c8csp2957847mao; | |
| Sun, 22 Nov 2020 15:50:48 -0800 (PST) | |
| X-Google-Smtp-Source: ABdhPJzqYr4sru4IxGMqGnkDjT71QUj/iBUwPmnCJR1yVvF7ptBTDmdZ8hWi6smg8tSfshFbPQE4 | |
| X-Received: by 2002:a17:902:bc4a:b029:d6:d985:29cf with SMTP id t10-20020a170902bc4ab02900d6d98529cfmr21987307plz.62.1606089048337; | |
| Sun, 22 Nov 2020 15:50:48 -0800 (PST) | |
| ARC-Seal: i=1; a=rsa-sha256; t=1606089048; cv=none; | |
| d=google.com; s=arc-20160816; | |
| b=fKERhixO8dI9G5USz5Wc/hAcpTLN0JOTd5Ma6r392XysBBATOHT9eRFX4O8lfmQbOG | |
| QSRry1jtn6/fiwyBiGjjAkZgHJZYwHSV54XCfbyeYu6oONmShmx7PiyBiECTIG6Lsb9w |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # https://hashcat.net/wiki/doku.php?id=example_hashes | |
| hashtype=500 | |
| filename=./hashes.txt | |
| # You can pass arguments to hashcat using this script, e.g. | |
| # ./crack-template.sh --username --show | |
| hashcat=/opt/hashcat/latest/hashcat.bin |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| $url = parse_url($_GET['url']); | |
| if ($url['host'] == 'example.com') { | |
| $ch = curl_init(); | |
| curl_setopt($ch, CURLOPT_URL, htmlentities($_GET['url'])); | |
| curl_setopt($ch, CURLOPT_FOLLOWLOCATION,TRUE); | |
| curl_exec($ch); | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Run this with "./crack-template.sh --show" to show cracked passwords | |
| hashcat=/opt/hashcat/latest/hashcat.bin | |
| # Dictionary attack (plain) | |
| $hashcat -m 7500 ./hashes.txt /usr/share/wordlists/rockyou.txt | |
| # Dictionary attack with rules (use base64.rule for best bang for buck -- dive.rule for exhaustive rules) | |
| $hashcat -m 1000 ./hashes.txt --username /usr/share/wordlists/crackstation.txt -O -r /opt/hashcat/latest/rules/dive.rule $1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 0x1000000: 0xE3A00012 mov r0, #0x12 | |
| 0x1000004: 0xE121F000 msr cpsr_c, r0 | |
| 0x1000008: 0xE36FF013 msr spsr_fsxc, #0x13 | |
| 0x100000c: 0xE3A00017 mov r0, #0x17 | |
| invalid type of memory specified | |
| unmapped memory read!!! addr: 0x14 size: 0x0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 0x1000000: 0xE36FF013 msr spsr_fsxc, #0x13 | |
| 0x1000004: 0xE3A00017 mov r0, #0x17 | |
| 0x1000008: 0xE121F000 msr cpsr_c, r0 | |
| 0x100000c: 0x00000000 andeq r0, r0, r0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| typedef enum uc_mode { | |
| UC_MODE_LITTLE_ENDIAN = 0, // little-endian mode (default mode) | |
| UC_MODE_BIG_ENDIAN = 1 << 30, // big-endian mode | |
| // arm / arm64 | |
| UC_MODE_ARM = 0, // ARM mode | |
| UC_MODE_THUMB = 1 << 4, // THUMB mode (including Thumb-2) | |
| UC_MODE_MCLASS = 1 << 5, // ARM's Cortex-M series (currently unsupported) | |
| UC_MODE_V8 = 1 << 6, // ARMv8 A32 encodings for ARM (currently unsupported) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| exec_addr: 0x4FFFC140 | |
| load_addr: 0x4E080000 | |
| load_size: 0x1F7FFF8 | |
| Finished parsing firmware header. Initializing Unicorn Engine... | |
| real_load_size: 0x1F80000 | |
| Finished loading Unicorn Engine. Loading firmware image into memory mapped region... | |
| Reading firmware image from 0x60800... | |
| Firmware loaded! Lets get this party started. | |
| 0x4fffc140: 0xE3A00000 mov r0, #0 | |
| 0x4fffc144: 0xE3A01000 mov r1, #0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| exec_addr: 0x4FFFC140 | |
| load_addr: 0x4E080000 | |
| load_size: 0x1F7FFF8 | |
| Finished parsing firmware header. Initializing Unicorn Engine... | |
| real_load_size: 0x1F80000 | |
| Finished loading Unicorn Engine. Loading firmware image into memory mapped region... | |
| Reading firmware image from 0x60800... | |
| Firmware loaded! Lets get this party started. | |
| %pc: 4fffc140 |