Skip to content

Instantly share code, notes, and snippets.

View jordan-wright's full-sized avatar
🎣

Jordan Wright jordan-wright

🎣
View GitHub Profile
@jordan-wright
jordan-wright / ForeignKeyTest.go
Last active August 29, 2015 14:00
Test of Gorm's Foreign Key Functionality
package main
import (
"database/sql"
"fmt"
"time"
"github.com/jinzhu/gorm"
_ "github.com/mattn/go-sqlite3"
)
root@bt:~# cd /pentest/passwords/john
root@bt:/pentest/passwords/john# ./unshadow /etc/passwd /etc/shadow > ~/passwords.txt
root@bt:/pentest/passwords/john# cat ~/passwords.txt
root:$6$jcs.3tzd$aIZHimcDCgr6rhXaaHKYtogVYgrTak8I/EwpUSKrf8cbSczJ3E7TBqqPJN2Xb.8UgKbKyuaqb78bJ8lTWVEP7/:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
root@bt:/pentest/passwords/john# john --single ~/passwords.txt
Warning: detected hash type "sha512crypt", but the string is also recognized as "crypt"
Use the "--format=crypt" option to force loading these as that type instead
Loaded 1 password hash (sha512crypt [32/32])
toor (root)
guesses: 1 time: 0:00:00:00 DONE (Fri Jan 4 10:12:42 2013) c/s: 35.00 trying: toor
Use the "--show" option to display all of the cracked passwords reliably
root@bt:/pentest/passwords/john# john --show ~/passwords.txt
root:toor:0:0:root:/root:/bin/bash
level4@io:~$ /levels/level04
sh-4.1$ cat /home/level5/.pass
Zx5VdzACNMY9lQ
@jordan-wright
jordan-wright / original_email.html
Last active December 26, 2015 17:49
Files for Linkedin Intro Phishing Blog Post
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style type="text/css">
/*BEGIN RAPPORTIVE*/
body {
padding:0;
margin:0
@jordan-wright
jordan-wright / consensus.txt
Last active May 18, 2017 19:00
Tor Consensus
<snip>
r IviazAsdNL AASW0qAJEUE0tk2UHR7BHiLUzno tILb+kHI/szC4u467eg/Z4G8UEo 2013-09-11 23:00:49 213.127.162.10 3074 0
s Exit Named Running Valid
v Tor 0.2.4.17-rc
w Bandwidth=5
p accept 80,443
r metroholografix ACEhJSRnU4ydobwjeJl+ZGKYFPY 9fsNMx/fO+VW3tn43n9f+KWy5Hc 2013-09-11 17:10:09 46.4.253.194 9001 9030
s Fast Guard Named Running Stable V2Dir Valid
v Tor 0.2.3.25
w Bandwidth=515
@jordan-wright
jordan-wright / extract.sh
Last active February 28, 2018 17:53 — forked from PaulSec/extract.sh
Extract Java Sources from APK
#!/bin/sh
# check that 7z is installed
command -v 7z >/dev/null 2>&1 || { echo >&2 "This script requires 7z. Aborting."; exit 1; }
jdgui="/opt/jd-cli"
dex2jar="/opt/dex2jar-2.0/d2j-dex2jar.sh"
if [ $# -eq 0 ]
then
@jordan-wright
jordan-wright / gist:33265dc9ddcaaf1cebb79db09a6c8f8c
Last active January 2, 2019 23:16
infosec thought leaders
briankrebs
violetblue
hdmoore
travisgoodspeed
troyhunt
attritionorg
tqbf
attrc
ErrataRob
edskoudis
@jordan-wright
jordan-wright / check_hosts.py
Last active February 16, 2019 15:38
Fabric Botnet C&C Blog Post
def check_hosts():
''' Checks each host to see if it's running '''
for host, result in execute(run_command, "uptime", hosts=env.hosts).iteritems():
running_hosts[host] = result if result.succeeded else "Host Down"
# Reset our signal handler
signal.signal(signal.SIGINT, signal.SIG_DFL)
target_bssid = raw_input('Enter a BSSID to perform an deauth attack (q to quit): ')
while target_bssid not in networks:
if target_bssid == 'q' : sys.exit(0)
raw_input('BSSID not detected... Please enter another (q to quit): ')
# Get our interface to the correct channel
print 'Changing ' + args.interface + ' to channel ' + str(networks[target_bssid][1])
os.system("iwconfig %s channel %d" % (args.interface, networks[target_bssid][1]))
# Now we have a bssid that we have detected, let's get the client MAC