Skip to content

Instantly share code, notes, and snippets.

View hoodoer's full-sized avatar
💻
Flailing arms, pounding on laptop.

Drew hoodoer

💻
Flailing arms, pounding on laptop.
View GitHub Profile
@hoodoer
hoodoer / Landing Page.html
Last active December 10, 2019 09:19
IFrames Based Multi-Step CSRF. X-Frame-Options can block this.
Hello! Two step CSRF coming up...
<iframe src="step1.html" width="0" height="0">
</iframe>
<iframe src="step2.html" width="0" height="0">
</iframe>
@hoodoer
hoodoer / landingPage.html
Created December 10, 2019 09:22
New tab based multi-request CSRF. Opens requests in a new tab if iframes are blocked. Haven't gotten this working quite yet though..
<html>
<head>
<script language="javascript">
window.onload = function() {
document.getElementById("csrfForm1").submit();
// to make 2nd form wait for 1st, put the following in a function and use as a callback for a new timer
document.getElementById("csrfForm2").submit();
}
@hoodoer
hoodoer / updateGitProjects.sh
Created December 10, 2019 09:26
Script to update all git projects in a directory. nice for updating backups once you've cloned all the repos you want into a directory.
#!/bin/bash
for i in `ls -d */`; do cd $i && git pull && cd ..; done
@hoodoer
hoodoer / Set cookie from console
Created December 10, 2019 09:28
Set cookie value at web console. This is stupid, but I do it so infrequently that I always end up googling it.
@hoodoer
hoodoer / wireguardRoutingSnippet.txt
Created December 10, 2019 09:29
Routing rule for wireguard VPN servers
ufw route allow in on wg0s out on eth0
@hoodoer
hoodoer / Chromium startup parameters
Created December 10, 2019 09:30
Chromium startup command for Kali and web app testing
chromium --no-sandbox --proxy-server="http://127.0.0.1:8080" --disable-xss-auditor &
@hoodoer
hoodoer / Tor ghost auto IP switching.txt
Created December 10, 2019 09:31
Tor Ghost auto IP switching with logging
So use a simple watch -n 30 torghost switch
That'll get you regular new IP addresses.
To log the IP addresses isn't as clean, do this (make sure you proxy through burp, and have Burp configured to use Tor proxy)
watch -n 15 -t curl --proxy http://127.0.0.1:8080 -s ipinfo.io/ip >> torSourceIPs.txt
Due to weird formatting, you'll often not actually see those IP addresses if you cat the file, but they're there if you open it in sublime or something.
You can grep them out cleanly with this:
@hoodoer
hoodoer / cmeTricks.txt
Created December 10, 2019 09:33
Crack Map Exec (CME) oneliner to parse out plaintext creds from cme --lsa
cat ~/.cme/logs/*secrets | egrep -v '(sha1|md5|DPAPI_SYSTEM|dpapi|NL\$KM|L\$|\$:aad3b435b51404eeaad3b435b51404ee)' | sort -u
@hoodoer
hoodoer / debianVmwareMount.txt
Created December 10, 2019 09:35
Mount VMWare Share in Debian
/usr/bin/vmhgfs-fuse .host:/ /mnt/hgfs -o subtype=vmhgfs-fuse,allow_other
This seems to work too in fstab:
vmhgfs-fuse /mnt/hgfs fuse defaults,allow_other 0 0
@hoodoer
hoodoer / firewallScanningTips.txt
Created December 10, 2019 09:38
Tough Firewall Scanning tips for hard to detect services, firewalls that are generally a pain in the butt.
Hard to detect service, tweaks to nmap to help:
Slow it down with -T2 or -T1
Use masscan
Fin scans
Null scans
XMas scans
Fragment scans
Data length scan
TTL scan