-
Basic scan to see what ports have a valid service running on them:
nmap {host} nmap -v {host}
Pass the -v
flag to print a little more information.
Available profiles | |
Fast scan | |
-F -T4 --max-retries 1 | |
Web scan | |
-p- -sV --version-all --script "http-* and not(dos or brute)" | |
Full Service Scan | |
-sV --version-all -p- -sT | |
SMB Scan |
# aproducer.py | |
# | |
# Async Producer-consumer problem. | |
# Challenge: How to implement the same functionality, but no threads. | |
import time | |
from collections import deque | |
import heapq | |
class Scheduler: |
/* | |
The exploit works on 19H1. | |
It was tested with ntoskrnl version 10.0.18362.295 | |
*/ | |
#include <Windows.h> | |
#include <stdio.h> | |
#include <string> | |
#include <ntstatus.h> | |
#include <processthreadsapi.h> |
IDA Plugins | Preferred | Neutral | Unreviewed |
---|
#!/usr/bin/python | |
#Python script that send your phone number a text as soon as Black Hat 2019 training goes live using Twilio | |
#The script can be coupled with cronjob that runs every hour or whatever you may see fit | |
from twilio.rest import Client | |
import requests | |
account_sid = '<your Twilio account SID>' | |
auth_token = '<your Twilio authentication token>' | |
client = Client(account_sid, auth_token) |
#include <windows.h> | |
#include <sys/types.h> | |
#include <unistd.h> | |
int main(int argc, char **argv){ | |
//msfvenom -p windows/exec cmd=calc.exe EXITFUNC=thread -f c -v shellcode |