Skip to content

Instantly share code, notes, and snippets.

View comradecheese's full-sized avatar

comradecheese

View GitHub Profile

H1:Medium KOTH

Enumeration

# basic port scan
sudo nmap -Pn -sV -sC -T5 <target-ip>

Port 80 is interesting. Create an account and navigate to profile. Open dev tools and block script.js URL. Reload page.

Attack

@comradecheese
comradecheese / OfflineKOTH.md
Last active January 16, 2024 04:22
TryHackMe Offline KOTH

Offline KOTH

Enumeration

# basic port scan
sudo nmap -sS <target-ip>

# script scan port 80
sudo nmap -sV -sC -p 80 <target-ip>
@comradecheese
comradecheese / MrRobot.md
Created September 12, 2021 05:44
VulnHub write-up for the MrRobot machine.

Mr Robot

VulnHub

Enumeration

Start port scanning and enumerating services.

# check if the box is up
ping <target-ip>

# run initial nmap scan
# decoder.py by comradecheese
# dirty decoder of text files encoded by base16, base32 or base64
# written for the TryHackMe Intro To Python / Scripting room challenges
# usage: python decoder.py <file> <count> <base>
# example: python decoder.py encodedflag.txt 50 64
from base64 import *
import sys
def decodedata():
command=/usr/share/i3blocks/$BLOCK_NAME
separator_block_width=15
markup=none
[volume]
label=VOL
instance=Master
#instance=PCM
interval=30
signal=10
#############################
### settings for i3-gaps: ###
#############################
# Set inner/outer gaps
#for_window [class="^.*"] border pixel 0
gaps inner 12
gaps outer 1
# Additionally, you can issue commands with the following syntax. This is useful to bind keys to changing the gap size.