- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
credit: @GossiTheDog: "If you want to setup FUZZBUNCH (the Equation exploit framework) you need Win7 VM + Python 2.6 + Pywin 2.6, then python fb.py for shell"
h/t @x0rz @DEYCrypt @hackerfantastic
context: https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation
writeup: https://www.trustedsec.com/blog/equation-group-dump-analysis-full-rce-win7-fully-patched-cobalt-strike/
decrypted files: https://github.com/x0rz/EQGRP_Lost_in_Translation
| #!/bin/bash | |
| #################################### | |
| # Get Buuf Icon Theme script | |
| # by Thom Hastings 2017 | |
| # BSD 3-clause License | |
| # tested Kali 2016.2 | |
| #################################### | |
| cd /tmp | |
| wget buuficontheme.free.fr -r -l1 --no-parent -A.tar.xz | |
| cd /usr/share/icons |
| # This script is released 'as is' into the public domain | |
| from math import cos,sin | |
| import os | |
| from time import sleep | |
| def y(p): | |
| return (sin(p)**3) | |
| def x(p): | |
| return -(13*cos(p)-5*cos(2*p)-2*cos(3*p)-cos(4*t))/16 | |
| while True: | |
| for r in range(14): |
| // Use Gists to store code you would like to remember later on | |
| console.log(window); // log the "window" object to the console |
| :: process-permissions.bat | |
| :: ======================= | |
| :: Batch Script for process permission analysis | |
| :: by Thom Hastings ©2012 New BSD License | |
| :: | |
| :: for reference- | |
| :: http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/ | |
| :: TODO: http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html | |
| @echo off | |
| title %username%@%userdomain% on %logonserver%\%computername% via %comspec% ~c0nS0Le |