Skip to content

Instantly share code, notes, and snippets.

View xmunoz's full-sized avatar
💜

Cristina xmunoz

💜
  • Quito
View GitHub Profile
@xmunoz
xmunoz / keybase.md
Last active September 11, 2017 18:35

Keybase proof

I hereby claim:

  • I am xmunoz on github.
  • I am xmun0x (https://keybase.io/xmun0x) on keybase.
  • I have a public key ASDOccCmlU8Kmx0_8ZQM5xnUV1Gc-I8A4YR__q1mvP9-5wo

To claim this, I am signing this object:

@xmunoz
xmunoz / ctf_commands.md
Last active February 15, 2017 22:15
CTF Tools

Read a binary TLS certificate (exported from wireshark).

openssl x509 -inform DER -in cert.bin -text

Extract public key from certificate

openssl x509 -inform DER -in cert.bin -pubkey -noout > key.pub
@xmunoz
xmunoz / generate keys
Created February 21, 2017 17:30
rsa tool
import math
import gmpy2
p=gmpy2.mpz(0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9) q=gmpy2.mpz(0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307)
e=gmpy2.mpz(0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41)
c=gmpy2.mpz(0x7fe1a4f743675d1987d25d38111fae0f78bbea6852cba5beda47db76d119a3efe24cb04b9449f53becd43b0b46e269826a983f832abb53b7a7e24a43ad15378344ed5c20f51e268186d24c76050c1e73647523bd5f91d9b6ad3e86bbf9126588b1dee21e6997372e36c3e74284734748891829665086e0dc523ed23c386bb520)
print('c', c.digits())
N = gmpy2.mul(p, q)
print("N", N.digits())
phi = gmpy2.mul(p-1, q-1)
@xmunoz
xmunoz / wordlist.txt
Last active June 19, 2017 17:43
framework/cms wordlist
requirements.txt
.gitignore
main.py
index.py
server.py
index.html
index.php
index.bak
README.md
README
@xmunoz
xmunoz / radare2.md
Last active September 12, 2017 23:44

Cheatsheet

Confirming protections

rabin2 -I something.bin
checksec something.bin
@xmunoz
xmunoz / wifu.md
Last active December 28, 2017 00:53
wifi hacking

native

# create new interface in monitor mode
sudo iw dev wlan0 interface add mon0 type monitor
# bring up the new interface
sudo ifconfig mon0 up
# check inteface status
iwconfig mon0
# verify traffic with tcpdump
sudo tcpdump -i mon0 -s 65000 -p
@xmunoz
xmunoz / electron.md
Last active January 12, 2018 14:37
electron whyyyy

Electron is a steaming pile of garbage with a million dependencies. Without it though, nightmare.js won't work. Worse even, it will die silently, nary an error message in sight. Here is my guide for installing electron.

  1. Pour yourself a glass of wine. You are going to be here a while.
apt-get update
apt-get upgrade
  1. Install nvm
@xmunoz
xmunoz / gadgets.txt
Last active May 19, 2020 21:24
gadgets and formatters for deserialization attacks for asp.net
== GADGETS ==
* ActivitySurrogateDisableTypeCheck [Disables 4.8+ type protections for ActivitySurrogateSelector, command is ignored]
Formatters: BinaryFormatter , LosFormatter , NetDataContractSerializer , SoapFormatter
* ActivitySurrogateSelector [This gadget ignores the command parameter and executes the constructor of ExploitClass class] (supports extra options: use the '--fullhelp' argument to view)
Formatters: BinaryFormatter (2) , LosFormatter , SoapFormatter
* ActivitySurrogateSelectorFromFile [Another variant of the ActivitySurrogateSelector gadget. This gadget interprets the command parameter as path to the .cs file that should be compiled as exploit class. Use semicolon to separate the file from additionally required assemblies, e. g., '-c ExploitClass.cs;System.Windows.Forms.dll'] (supports extra options: use the '--fullhelp' argument to view)
Formatters: BinaryFormatter (2) , LosFormatter , SoapFormatter
AxHostStateFormatters: BinaryFormatter , LosFormatter , NetDataContractSerializer , Soap