This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // Taken from https://urlscan.io/result/ce20fb52-b4d9-45dd-8034-fb9eae99350e#transactions: | |
| // Request 1 for loadtxt.php: | |
| // Blob 2 from response decoded with base64decode.org: | |
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <title></title> | |
| <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.1.1/jquery.min.js"></script> | |
| </head> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/perl -w | |
| use strict; | |
| use Data::Dumper; | |
| my %killchainmodel; | |
| my $cvssmetric; | |
| my $metricname; | |
| my $metricscore; | |
| my $phasename; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Zoom client application chat Giphy arbitrary file write | |
| https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 | |
| 8.5 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H | |
| Tims-MacBook-Air:~ timb$ ./cvss-to-kill-chain-phase.pl CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H | |
| Delivery | |
| 0.6 | |
| Weaponisation | |
| 0.3 | |
| Command & Control |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/perl | |
| use Cwd; | |
| use MIME::Base64; | |
| $start = getcwd(); | |
| $maxnewpath = 1024; | |
| while (sysread(STDIN, $byte, 1) != 0) { | |
| $maxpath = 100; | |
| $string = $byte; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # Not to be confused with https://labs.portcullis.co.uk/tools/unix-socket-scanner/ which does more detailed enumeration but doesn't do permission checks | |
| netstat -an | grep stream | awk '{print $9}' | sort | uniq | egrep -v "vms\/|^$" | while read socketname | |
| do | |
| if [ -n "$(printf "${socketname}" | grep "^/")" ] | |
| then | |
| printf "==\n" | |
| ls -la "${socketname}" | |
| if [ -n "$(ls -la "${socketname}" | grep "s.......w. ")" ] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 15006 | |
| [] | |
| 15001 | |
| [] | |
| 15004 | |
| [] | |
| 15004/add | |
| 4.05 | |
| 15004/remove | |
| 4.05 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <//15006>;ct=0;obs,<//15001>;ct=0;obs,<//15004>;ct=0;obs,<//15004/add>;ct=0,<//15004/remove>;ct=0,<//15010>;ct=0;obs,<//15005>;ct=0;obs,<//15011/15012>;ct=0;obs,<//15011/9034>;ct=0,<//15011/9030>;ct=0,<//15011/9031>;ct=0,<//15011/9094>;ct=0;obs,<//15011/9095>;ct=0;obs,<//15011/9104>;ct=0;obs,<//15011/9063>;ct=0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| OLDNAME="${1}" | |
| NEWNAME="${2}" | |
| grep -r "${OLDNAME}" . | cut -f 1 -d : | sort | uniq | while read filename | |
| do | |
| cp "${filename}" "${filename}.old" | |
| cat "${filename}.old" | sed "s/${OLDNAME}/${NEWNAME}/g" > "${filename}" | |
| rm "${filename}.old" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 4th time we've run the CTF (sometimes as Cisco/Portcullis, this year as Team Alpaca) | |
| 106 challenges | |
| Bandwidth usage so far peaked out at 24.4Mbps and disk usage at 19.4MB/s | |
| Time machine challenge resulted in single CPU being pegged at 100%, required reprovisioning (x4 vCPUs) - go Ansible/Docker! | |
| 43 teams registered including one person playing over the Internet on their own (currently in 3rd place) | |
| 401 right submissions | |
| 507 wrong submissions | |
| Jonty was yet again an item in the scavenger hunt category - sorry Jonty :) | |
| We also caused uproar in the HAM community over "parabolic antenna" | |
| We included a badge challenge for the first time |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # https://makecode.microbit.org/31667-75115-87037-56723 | |
| let score = 0 | |
| let delay = 0 | |
| let highscore = 0 | |
| let onscreen = 0 | |
| let heart: Image = null | |
| let lives = 0 | |
| let clearscreen: Image = null | |
| let ship: Image = null | |
| input.onButtonPressed(Button.A, () => { |