Skip to content

Instantly share code, notes, and snippets.

View cmartinbaughman's full-sized avatar

Chris Baughman cmartinbaughman

  • TE Connectivity
  • USA
View GitHub Profile
@cmartinbaughman
cmartinbaughman / linux-kernel-tutorial-gregkh_lxf
Created June 13, 2013 14:53
Clips of a fantastic Linux Kernel development tutorial, by Greg Kroah-Hartman.
So run off and install git on your Linux system using the package
manager you are comfortable with (personally, I use openSUSE, and a
simple 'zypper install git' does everything that is needed.)
Then start by cloning the main Linux kernel repository:
$ mkdir ~/linux
$ cd ~/linux
$ git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
@cmartinbaughman
cmartinbaughman / Creating MIUI OTA patches
Created October 19, 2012 18:30
Creating MIUI OTA patches
(转)creating binary patch files (.p files) with bsdiff
I was looking through a .602 update.zip and noticed the .p files; I opened one up in notepad++ and saw that the file begins with "bsdiff" so did a search and found this tool:
http://www.daemonology.net/bsdiff/
bsdiff takes an original file and a modified file as input and creates a binary patch file.
bspatch takes an original file and a patch file as input and creates a modified file.
usage (windows):
@cmartinbaughman
cmartinbaughman / handy_commands
Created October 25, 2011 20:38
Commands to remember...
#Cracking an FTP server (use whatever service you want THC Hydra supports lots!
hydra -L wordlist.txt -P passlist.txt 192.168.1.1 ftp
#Other handy THC Hydra commands~!
#Log in to ftp service with -l user and -p password:
./hydra -l john -p doe 192.168.0.1 ftp
#Log in to IMAP service using user wordlist with -L user.txt and the password -p secret:
./hydra -L user.txt -p secret 192.168.0.1 imap PLAIN
@cmartinbaughman
cmartinbaughman / GetCachedNetworkCredentials.cmd
Created June 12, 2013 15:22
More nifty network commands for the super secret admin toolbox, found somewhere here on gist original by fabriceleal!
rundll32.exe keymgr.dll, KRShowKeyMgr
@cmartinbaughman
cmartinbaughman / winnt-sec2008
Created October 22, 2012 16:57
Windows Security (New ways to crack the Win Password Hashes!
Password hashes are stored in the registry, in the key HKLM\Security\Sam. Normally you must have administrator privileges to access it. Even you are the local admin – you still have to assign manually full control permission for this subkey to yourself.
The juicy stuff physically is stored in two files:
C:\windows\system32\config\sam
and
C:\windows\system32\config\system
http://www.codeproject.com/KB/files/FDump.aspx is a tool that can dump file sectors directly from disk using logical offsets.
C:\windows\system32\config\sam and C:\windows\system32\config\system in target system (the second one is needed because of the “boot key” is stored there) so then we may process it somewhere else with Cain & Abel.
@cmartinbaughman
cmartinbaughman / GoogleHackMasterList.txt
Last active April 17, 2024 14:57
The definitive super list for "Google Hacking".
admin account info" filetype:log
!Host=*.* intext:enc_UserPassword=* ext:pcf
"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd
"AutoCreate=TRUE password=*"
"http://*:*@www” domainname
"index of/" "ws_ftp.ini" "parent directory"
"liveice configuration file" ext:cfg -site:sourceforge.net
"parent directory" +proftpdpasswd
Duclassified" -site:duware.com "DUware All Rights reserved"
duclassmate" -site:duware.com