First we index the numbers from 1 to 10 using json_lines and cryptocli in a temporary index.
seq 1 10 | \
bash json_lines.sh number 1 2>/dev/null | \
./cryptocli \
-- stdin \
-- line \
-- elasticsearch-put \
--index number_messages \
First we index the numbers from 1 to 10 using json_lines and cryptocli in a temporary index.
seq 1 10 | \
bash json_lines.sh number 1 2>/dev/null | \
./cryptocli \
-- stdin \
-- line \
-- elasticsearch-put \
--index number_messages \
#!/bin/bash | |
set -e | |
mkdir -pv /opt/local/{share,tools,bin} | |
mkdir -pv /opt/local/share/wordlists | |
PATH=/opt/local/bin:${PATH} | |
echo "deb http://kali.download/kali kali-rolling main contrib non-free" > /etc/apt/sources.list |
How to install xmind (on kali):
apt install openjdk-8-jdk libwebkit2gtk-4.0
libwebkitgtk-1.0-0
from the setup.sh
scriptsetup.sh
as root./XMind_64/Xmind
#!/bin/sh | |
set -e | |
## SEE https://medium.com/@ebuschini/iptables-and-docker-95e2496f0b45 | |
## You need to add rules in DOCKER-BLOCK AND INPUT for traffic that does not go to a container. | |
## You only need to add one rule if the traffic goes to the container | |
CWD=$(cd "$(dirname "${0}")"; pwd -P) | |
FILE="${CWD}/$(basename "${0}")" |
#!/usr/bin/env python | |
# Copyright (c) 2018 Matthew Daley | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to | |
# deal in the Software without restriction, including without limitation the | |
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or | |
# sell copies of the Software, and to permit persons to whom the Software is | |
# furnished to do so, subject to the following conditions: |
# Example for tor client to connect to onion service | |
HidServAuth <onion service> <auth from hostname> | |
DataDir ~/.tor | |
SocksPort 9050 # set the port of the proxy |
unbind [ | |
unbind p | |
bind Escape copy-mode | |
bind p paste-buffer | |
bind-key -Tcopy-mode-vi 'v' send -X begin-selection | |
bind-key -Tcopy-mode-vi 'y' send -X copy-pipe-and-cancel "xclip -se c -i" | |
bind-key -Tcopy-mode-vi Escape send -X cancel |
unbind [ | |
unbind p | |
bind Escape copy-mode | |
bind p paste-buffer | |
bind-key -Tcopy-mode-vi 'v' send -X begin-selection | |
bind-key -Tcopy-mode-vi 'y' send -X copy-pipe-and-cancel "xclip -se c -i" | |
bind-key -Tcopy-mode-vi Escape send -X cancel | |
set-option -s set-clipboard off |
package main | |
/* | |
The goal of this PoC is to try to exec a payload built within the binary. | |
I kind of use the same idea as for protobuf, compile the target into executable | |
then copy the payload inside the program, do the reverse operation and exec it. | |
It works like this: | |
- compile your binary to the target arch | |
- use cryptocli dd -in <binary> -encoders gzip,byte-string -out <temp_file> |