I hereby claim:
- I am zuphzuph on github.
- I am zuphzuph (https://keybase.io/zuphzuph) on keybase.
- I have a public key ASC0vWruvp5RO9z1C_KEvKraPDacVO9C8cCDU9gKcXS0Ugo
To claim this, I am signing this object:
package main | |
import ( | |
"encoding/csv" | |
"encoding/json" | |
"io/ioutil" | |
"os" | |
) | |
type Instance struct { |
function Invoke-Potato | |
{ | |
<# | |
.SYNOPSIS | |
Script leverages Reflective Potato and Invoke-ReflectivePEInjection to reflectively load Rotten Potato DLL directly into memory. This | |
allows you to indirectly perform the Rotten Potato attack without having to touch the disk, or utilize any external loaders. | |
The script takes a Shellcode parameter which will execute any arbitrary shellcode within the HostProc argument. Default is set to C:\Windows\System32\notepad.exe |
import os | |
import subprocess | |
import ctypes | |
# See: https://blogs.msmvps.com/erikr/2007/09/26/set-permissions-on-a-specific-service-windows/ | |
svcinfo = {} | |
nonadmin = ['AU', 'AN', 'BG', 'BU', 'DG', 'WD', 'IU', 'LG'] | |
FNULL = open(os.devnull, 'w') |
########### Build to attack Oracle in under 20 mins ########### | |
[] Kali 2018.1 (64bit) | |
root@kali:~# mkdir /opt/oracle | |
root@kali:~# cd /opt/oracle | |
root@kali:/opt/oracle# wget instantclient-basic-linux.x64-12.2.0.1.0.zip (68mb) | |
root@kali:/opt/oracle# wget instantclient-sqlplus-linux.x64-12.2.0.1.0.zip (1mb) | |
root@kali:/opt/oracle# wget instantclient-sdk-linux.x64-12.2.0.1.0.zip (1mb) | |
[] Download from http://www.oracle.com/technetwork/database/features/instant-client/index-097480.html (x86_64) xce/orc |
I hereby claim:
To claim this, I am signing this object: