- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
import SimpleHTTPServer | |
import SocketServer | |
import logging | |
import cgi | |
import sys | |
if len(sys.argv) > 2: | |
PORT = int(sys.argv[2]) |
#!/bin/bash | |
# Author: @unfo | |
# xargs ls --full-time output: | |
# -rw-rw---- 1 USER GROUP 458654 2015-08-09 11:12:37.000000000 +0300 ./path/2015/08/09/file.ext | |
# awk fields: | |
# 1 2 3 4 5 6 7 8 9 | |
find . -type f -print0 \ | |
| xargs -0 ls --full-time \ | |
| awk '{ total[$6] += $5 } END { for (d in total) { printf("%s\t%6.2f MB\n",d,(total[d] / 1024 / 1024)) } }' \ |
$ seddiff 's/redcarpet/magiccarpet/;s/pygments/rouge/' _config.yml | |
Result of s/redcarpet/magiccarpet/;s/pygments/rouge/ against _config.yml: | |
7,8c7,8 | |
< markdown: magiccarpet | |
< highlighter: rouge | |
--- | |
> markdown: redcarpet | |
> highlighter: pygments | |
54c54 | |
< - magiccarpet |
msf> search foobar | |
1 post/windows/foobar Blaa blaa desc here | |
2 post/multi/kek/buufar Another exploit | |
3 exploit/solaris/mcfoo For solaris | |
msf> use 1 | |
post/windows/foobar> |
<?xml version="1.0" encoding="UTF-8" standalone="no"?> | |
<folders> | |
<folder> | |
<title>oscp</title> | |
<snippets> | |
<snippet> | |
<title>spawn tty</title> | |
<content>python -c 'import pty;pty.spawn("/bin/bash")'</content> | |
</snippet> | |
<snippet> |
#!/bin/bash | |
BLACK="\033[30m" | |
RED="\033[31m" | |
GREEN="\033[32m" | |
YELLOW="\033[33m" | |
BLUE="\033[34m" | |
PINK="\033[35m" | |
CYAN="\033[36m" | |
WHITE="\033[37m" |
Those steps in that order are important. You want a fresh state for the machine and you want to do just simple port scanning first because doing nmap's service scanning or nse scripts might send payloads that actually crash services. So be careful.
use bitvec::prelude::*; | |
#[cfg(test)] | |
mod tests { | |
#[test] | |
fn it_works() { | |
assert_eq!(2 + 2, 4); | |
} | |
} |