mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2024-11-25 21:30:17 +00:00
Update Cheat Sheet.md
This commit is contained in:
parent
6180b7a60e
commit
0226e9bcd4
1 changed files with 19 additions and 0 deletions
|
@ -214,6 +214,18 @@ On target machine `./chisel client <attacker>:<attacker_listening_port> R:localh
|
||||||
|
|
||||||
Then `http://ip/page?a=whoami;`
|
Then `http://ip/page?a=whoami;`
|
||||||
|
|
||||||
|
## SMTP
|
||||||
|
|
||||||
|
Using `VRFY` we can check which email addresses are valid or we can try to send an email and verify through `RCPT TO:email`<br/>
|
||||||
|
|
||||||
|
|
||||||
|
Sending an email address with attachment we can use `sawks`
|
||||||
|
|
||||||
|
```bash
|
||||||
|
swaks --server IP -f from@arz.com -t to@arz.com --attach file.rtf
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
### Screen
|
### Screen
|
||||||
|
|
||||||
If there's a deattached screen session running as root , we can re attach it only if screen binary has SUID bit `screen -r root/`
|
If there's a deattached screen session running as root , we can re attach it only if screen binary has SUID bit `screen -r root/`
|
||||||
|
@ -913,3 +925,10 @@ https://published-prd.lanyonevents.com/published/rsaus20/sessionsFiles/18100/202
|
||||||
|
|
||||||
https://github.com/BishopFox/badPods
|
https://github.com/BishopFox/badPods
|
||||||
|
|
||||||
|
# Android
|
||||||
|
|
||||||
|
## Root Detection Bypass
|
||||||
|
|
||||||
|
|
||||||
|
## SSL Pinning
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue