# basic port scan
sudo nmap -Pn -sV -sC -T5 <target-ip>
Port 80 is interesting. Create an account and navigate to profile. Open dev tools and block script.js URL. Reload page.
Start port scanning and enumerating services.
# check if the box is up
ping <target-ip>
# run initial nmap scan
# decoder.py by comradecheese | |
# dirty decoder of text files encoded by base16, base32 or base64 | |
# written for the TryHackMe Intro To Python / Scripting room challenges | |
# usage: python decoder.py <file> <count> <base> | |
# example: python decoder.py encodedflag.txt 50 64 | |
from base64 import * | |
import sys | |
def decodedata(): |
command=/usr/share/i3blocks/$BLOCK_NAME | |
separator_block_width=15 | |
markup=none | |
[volume] | |
label=VOL | |
instance=Master | |
#instance=PCM | |
interval=30 | |
signal=10 |
############################# | |
### settings for i3-gaps: ### | |
############################# | |
# Set inner/outer gaps | |
#for_window [class="^.*"] border pixel 0 | |
gaps inner 12 | |
gaps outer 1 | |
# Additionally, you can issue commands with the following syntax. This is useful to bind keys to changing the gap size. |