This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import argparse | |
from subprocess import call | |
# Useful for Bluetooth device discovery when Bluetooth device addresses may be one off from wireless MAC addresses | |
# See, for example, "Hacking Exposed: Wireless", 3rd edition, by Joshua Wright and Johnny Cache, pages 211-214. | |
# To generate the list of addresses and test using hcitool (or another command line tool): | |
# python3 off-by-one.py -l macs.lst | while read -r line; do hcitool name "$line"; done | |
def off_by_one(mac_list, flag): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
use post/windows/gather/enum_ad_computers | |
set FIELDS distinguishedName,dNSHostname,description,operatingSystem,operatingSystemServicePack | |
set FILTER (&(objectCategory=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192)) | |
run | |
set FILTER (&(objectCategory=computer)(operatingSystem=*server*)(!(userAccountControl:1.2.840.113556.1.4.803:=8192))) | |
run | |
set FILTER (&(objectCategory=computer)(!(operatingSystem=*server*))) | |
run | |
set FIELDS distinguishedName,name,mail,description | |
set FILTER (&(objectCategory=person)(objectClass=user)(!(userAccountControl:1.2.840.113556.1.4.803:=2))) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
def initialize |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html> | |
<html> | |
<head> | |
<title>PHP OS Command Injection</title> | |
<!-- Adapted from the SecureState 2015 High School CTF http://www.mountunion.edu/information-security-challenge-slated-for-saturday --> | |
<!-- Originally hosted at http://warroom.securestate.com --> | |
</head> | |
<body> | |
<h1>MD5 Hashing</h1> | |
<br /> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#The War Room Blog | |
#http://warroom.securestate.com/index.php/cya-cover-your-alfa-part-ii/ | |
x=1 # set the variables | |
HIGH_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//') # parse the output of /proc/net/wireless to get integers only | |
LOW_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//') | |
AVG_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//') | |
HIGH_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//') | |
LOW_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//') | |
AVG_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//') |
NewerOlder