Skip to content

Commit fd294c4

Browse files
committed
misc updates
1 parent b4c5009 commit fd294c4

File tree

13 files changed

+91
-27
lines changed

13 files changed

+91
-27
lines changed

content/android/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Android"
2+
title: "ANDROID"
33
menu: "main"
44
weight: 1
55
---

content/android/adb.md

Lines changed: 33 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,25 +7,47 @@ weight: 5
77

88
## Commands
99

10-
```sh
11-
# Install apk
10+
Install apk
11+
```bash
1212
adb install <path.apk>
13+
```
1314

14-
# Lists all installed packages
15+
Uninstalls the application
16+
```sh
17+
adb shell am start <package_name>/<activity_name>
18+
```
19+
20+
Clear the application data
21+
```sh
22+
adb shell pm clear <package_name>
23+
```
24+
25+
Lists all installed packages
26+
```sh
1527
adb shell pm list packages
28+
```
1629

17-
# List only third party packages
30+
List only third party packages
31+
```sh
1832
adb shell pm list packages -3
33+
```
1934

20-
# Clear the application data
21-
adb shell pm clear <package_name>
22-
23-
# List information such as activities and permissions of a package
35+
List information such as activities and permissions of a package
36+
```sh
2437
adb shell dumpsys package <package_name>
38+
```
2539

26-
# Starts the activity of the specified package
40+
Starts the activity of the specified package
41+
```sh
2742
adb shell am start <package_name>/<activity_name>
43+
```
2844

29-
# Uninstalls the application
30-
adb shell am start <package_name>/<activity_name>
45+
Copy a file from the device
46+
```sh
47+
adb pull <remote-file> <local-file>
48+
```
49+
50+
Copy a file on the device
51+
```sh
52+
adb push <local-file> <destination-directory>
3153
```

content/android/vulnerabilities/deep-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Because of Link Hijacking. This happen when a malicious app registers an URI tha
7777
Suppose that:
7878

7979
* The victim user have malicious app installed
80-
* Both apps (victim and malicious) manage `geo://` , `https://google.com`
80+
* Both apps (victim and malicious) manage `geo://`, `https://google.com`
8181

8282
| **Android** | **Victim App installed** | **Link supported** | **URI** | **Behavior** |
8383
|-------------|--------------------------|--------------------|--------------------|----------------------------------------------------|

content/misc/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Misc"
2+
title: "MISC"
33
menu: "main"
44
weight: 4
55
---

content/misc/password-cracking.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -41,18 +41,21 @@ hydra -L user.txt -P pass.txt <ip> <protocol>
4141
## Rules (password bruteforce)
4242

4343
* **FIRST CHOICE**: best64 (now best66). Fast, works well.
44-
* [https://github.com/hashcat/hashcat/blob/master/rules/best66.rule](https://github.com/hashcat/hashcat/blob/master/rules/best66.rule)
44+
* [best66.rule](https://github.com/hashcat/hashcat/blob/master/rules/best66.rule)
4545
* **SECOND/THIRD CHOICE**: InsidePro-PasswordsPro (\~3000) && InsidePro-Hashmanager (\~7000)
46-
* (2) [https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-PasswordsPro.rule](https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-PasswordsPro.rule)
47-
* (3) [https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-HashManager.rule](https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-HashManager.rule)
46+
* (2) [InsidePro-PasswordsPro.rule](https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-PasswordsPro.rule)
47+
* (3) [InsidePro-HashManager.rule](https://github.com/hashcat/hashcat/blob/master/rules/InsidePro-HashManager.rule)
4848
* You can also combine them...
4949
* **FOURTH CHOICE**: OneRuleToRuleThemAll. (\~50k). The best.
50-
* [https://github.com/NotSoSecure/password\_cracking\_rules/blob/master/OneRuleToRuleThemAll.rule](https://github.com/NotSoSecure/password_cracking_rules/blob/master/OneRuleToRuleThemAll.rule)
50+
* [OneRuleToRuleThemAll.rule](https://github.com/NotSoSecure/password_cracking_rules/blob/master/OneRuleToRuleThemAll.rule)
5151

5252
**Generate wordlist based on rules**
5353

54-
[https://weakpass.com/generate](https://weakpass.com/generate)&#x20;
55-
54+
1. Online tool: [https://weakpass.com/generate](https://weakpass.com/generate)
55+
2. Hashcat:
56+
```bash
57+
hashcat -r best66.rule --stdout file.txt
58+
```
5659

5760

5861
**More info about rules:**

content/network/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Network"
2+
title: "NETWORK"
33
menu: "main"
44
weight: 3
55
---

content/network/network-services-exploitation.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,13 @@ mysql -h <hostname> -u root -p
225225
* Brute force login
226226
* Try with `root` default user
227227

228+
## 1433 - MSSQL
229+
230+
```sh
231+
# Connect with password (NTLM auth)
232+
impacket-mssqlclient Administrator:pass<hostname> -windows-auth
233+
```
234+
228235
## 3389 - RDP
229236

230237
```sh

content/web/_index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
title: "Web"
3-
2+
title: "WEB"
43
menu: "main"
54
weight: 2
65
---
Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,22 @@
11
---
2-
title: ""
2+
title: "Reconnaissance"
33
weight: 3
44
---
55

6-
# Automation
6+
# Reconnaissance
77

88
## Enumerating web resources
99

1010
```sh
1111
# Web fuzzer
12-
ffuf -w wordlist.txt -u https://example.com/file-FUZZ -c
12+
ffuf -c -u https://example.com/file-FUZZ -w wordlist.txt
13+
14+
# with extension
15+
ffuf -c -u https://example.com/FUZZ -w wordlist.txt -e .php,.html,.txt
16+
17+
# with more placeholder
18+
ffuf -c -u http://example.com/FUZZ/FILE -w wordlist.txt:FUZZ -w wordlist2.txt:FILE
19+
1320

1421
# Recursive content discovery
1522
# You can set depth (recursion), extract links from response body

content/web/vulnerabilities/os-command-injection.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,3 +59,15 @@ There are so many ways: [https://book.hacktricks.wiki/linux-hardening/bypass-bas
5959
`command`
6060
$(command)
6161
```
62+
63+
## Identify CMD or PowerShell
64+
65+
To determine whether commands are executed by PowerShell or CMD, use this snippet:
66+
67+
```cmd
68+
(dir 2>&1 *`|echo CMD);&<# rem #>echo PowerShell
69+
```
70+
71+
## Reverse Shell Generator
72+
73+
https://www.revshells.com/

0 commit comments

Comments
 (0)