Skip to content

Instantly share code, notes, and snippets.

View xmunoz's full-sized avatar
💜

Cristina xmunoz

💜
  • Bogotá
View GitHub Profile
INFO interface: output: Machine booted and ready!
INFO interface: output: ==> permanent: Machine booted and ready!
==> permanent: Machine booted and ready!
INFO warden: Calling IN action: #<Vagrant::Action::Builtin::Call:0x00007f6994813148>
INFO runner: Running action: machine_action_up #<Vagrant::Action::Builder:0x00007f6994eb1a68>
INFO warden: Calling IN action: #<Vagrant::Action::Builtin::IsEnvSet:0x00007f6994f9e728>
INFO warden: Calling OUT action: #<Vagrant::Action::Builtin::IsEnvSet:0x00007f6994f9e728>
INFO runner: Running action: machine_action_up #<Vagrant::Action::Warden:0x00007f6995237278>
INFO warden: Calling IN action: #<Proc:0x00007f69954056e0@/opt/vagrant/embedded/gems/2.2.13/gems/vagrant-2.2.13/lib/vagrant/action/warden.rb:126 (lambda)>
INFO warden: Calling IN action: #<Vagrant::Action::Builtin::CloudInitWait:0x00007f6995236f80>
@xmunoz
xmunoz / gadgets.txt
Last active May 19, 2020 21:24
gadgets and formatters for deserialization attacks for asp.net
== GADGETS ==
* ActivitySurrogateDisableTypeCheck [Disables 4.8+ type protections for ActivitySurrogateSelector, command is ignored]
Formatters: BinaryFormatter , LosFormatter , NetDataContractSerializer , SoapFormatter
* ActivitySurrogateSelector [This gadget ignores the command parameter and executes the constructor of ExploitClass class] (supports extra options: use the '--fullhelp' argument to view)
Formatters: BinaryFormatter (2) , LosFormatter , SoapFormatter
* ActivitySurrogateSelectorFromFile [Another variant of the ActivitySurrogateSelector gadget. This gadget interprets the command parameter as path to the .cs file that should be compiled as exploit class. Use semicolon to separate the file from additionally required assemblies, e. g., '-c ExploitClass.cs;System.Windows.Forms.dll'] (supports extra options: use the '--fullhelp' argument to view)
Formatters: BinaryFormatter (2) , LosFormatter , SoapFormatter
AxHostStateFormatters: BinaryFormatter , LosFormatter , NetDataContractSerializer , Soap
@xmunoz
xmunoz / electron.md
Last active January 12, 2018 14:37
electron whyyyy

Electron is a steaming pile of garbage with a million dependencies. Without it though, nightmare.js won't work. Worse even, it will die silently, nary an error message in sight. Here is my guide for installing electron.

  1. Pour yourself a glass of wine. You are going to be here a while.
apt-get update
apt-get upgrade
  1. Install nvm
@xmunoz
xmunoz / wifu.md
Last active December 28, 2017 00:53
wifi hacking

native

# create new interface in monitor mode
sudo iw dev wlan0 interface add mon0 type monitor
# bring up the new interface
sudo ifconfig mon0 up
# check inteface status
iwconfig mon0
# verify traffic with tcpdump
sudo tcpdump -i mon0 -s 65000 -p
@xmunoz
xmunoz / radare2.md
Last active September 12, 2017 23:44

Cheatsheet

Confirming protections

rabin2 -I something.bin
checksec something.bin
@xmunoz
xmunoz / wordlist.txt
Last active June 19, 2017 17:43
framework/cms wordlist
requirements.txt
.gitignore
main.py
index.py
server.py
index.html
index.php
index.bak
README.md
README
@xmunoz
xmunoz / generate keys
Created February 21, 2017 17:30
rsa tool
import math
import gmpy2
p=gmpy2.mpz(0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9) q=gmpy2.mpz(0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307)
e=gmpy2.mpz(0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41)
c=gmpy2.mpz(0x7fe1a4f743675d1987d25d38111fae0f78bbea6852cba5beda47db76d119a3efe24cb04b9449f53becd43b0b46e269826a983f832abb53b7a7e24a43ad15378344ed5c20f51e268186d24c76050c1e73647523bd5f91d9b6ad3e86bbf9126588b1dee21e6997372e36c3e74284734748891829665086e0dc523ed23c386bb520)
print('c', c.digits())
N = gmpy2.mul(p, q)
print("N", N.digits())
phi = gmpy2.mul(p-1, q-1)
@xmunoz
xmunoz / ctf_commands.md
Last active February 15, 2017 22:15
CTF Tools

Read a binary TLS certificate (exported from wireshark).

openssl x509 -inform DER -in cert.bin -text

Extract public key from certificate

openssl x509 -inform DER -in cert.bin -pubkey -noout > key.pub