{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** ๐ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐ฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}
ํ ์๋ต TTL:\
127 = Windows\
254 = Cisco\
๋๋จธ์ง, ์ด๋ค ๋ฆฌ๋
์ค
$1$- md5\
$2$ ๋๋ $2a$ - Blowfish\
$5$- sha256\
$6$- sha512
์๋น์ค ๋ค์ ๋ฌด์์ด ์๋์ง ๋ชจ๋ฅธ๋ค๋ฉด, HTTP GET ์์ฒญ์ ์๋ํด ๋ณด์ธ์.
**UDP ์ค์บ**\
nc -nv -u -z -w 1 \ 160-16
ํน์ ํฌํธ๋ก ๋น UDP ํจํท์ด ์ ์ก๋ฉ๋๋ค. UDP ํฌํธ๊ฐ ์ด๋ ค ์์ผ๋ฉด, ๋์ ๋จธ์ ์์ ์๋ต์ด ์ ์ก๋์ง ์์ต๋๋ค. UDP ํฌํธ๊ฐ ๋ซํ ์์ผ๋ฉด, ๋์ ๋จธ์ ์์ ICMP ํฌํธ ๋๋ฌ ๋ถ๊ฐ ํจํท์ด ์ ์ก๋์ด์ผ ํฉ๋๋ค.\
UDP ํฌํธ ์ค์บ์ ์ข
์ข
์ ๋ขฐํ ์ ์์ผ๋ฉฐ, ๋ฐฉํ๋ฒฝ๊ณผ ๋ผ์ฐํฐ๊ฐ ICMP ํจํท์ ์ฐจ๋จํ ์ ์์ต๋๋ค. ์ด๋ก ์ธํด ์ค์บ์์ ์๋ชป๋ ๊ธ์ ๊ฒฐ๊ณผ๊ฐ ๋ฐ์ํ ์ ์์ผ๋ฉฐ, ์ค์บ๋ ๋จธ์ ์์ ๋ชจ๋ UDP ํฌํธ๊ฐ ์ด๋ ค ์๋ ๊ฒ์ผ๋ก ํ์๋๋ UDP ํฌํธ ์ค์บ์ ์์ฃผ ๋ณผ ์ ์์ต๋๋ค.\
๋๋ถ๋ถ์ ํฌํธ ์ค์บ๋๋ ์ฌ์ฉ ๊ฐ๋ฅํ ๋ชจ๋ ํฌํธ๋ฅผ ์ค์บํ์ง ์์ผ๋ฉฐ, ์ผ๋ฐ์ ์ผ๋ก ์ค์บ๋๋ "ํฅ๋ฏธ๋ก์ด ํฌํธ"์ ๋ฏธ๋ฆฌ ์ค์ ๋ ๋ชฉ๋ก์ ๊ฐ์ง๊ณ ์์ต๋๋ค.
# CTF - ํธ๋ฆญ
**Windows**์์ **Winzip**์ ์ฌ์ฉํ์ฌ ํ์ผ์ ๊ฒ์ํ์ธ์.\
**๋์ฒด ๋ฐ์ดํฐ ์คํธ๋ฆผ**: _dir /r | find ":$DATA"_\
```
binwalk --dd=".*" #Extract everything
binwalk -M -e -d=10000 suspicious.pdf #Extract, look inside extracted files and continue extracing (depth of 10000)
```
## Crypto
**featherduster**\
**Basae64**(6โ>8) โ> 0...9, a...z, AโฆZ,+,/\
**Base32**(5 โ>8) โ> AโฆZ, 2โฆ7\
**Base85** (Ascii85, 7โ>8) โ> 0...9, a...z, A...Z, ., -, :, +, =, ^, !, /, \*, ?, &, <, >, (, ), \[, ], {, }, @, %, $, #\
**Uuencode** --> "_begin \ \_"๋ก ์์ํ๊ณ ์ด์ํ ๋ฌธ์\
**Xxencoding** --> "_begin \ \_"๋ก ์์ํ๊ณ B64\
\
**Vigenere** (์ฃผํ์ ๋ถ์) โ> [https://www.guballa.de/vigenere-solver](https://www.guballa.de/vigenere-solver)\
**Scytale** (๋ฌธ์์ ์คํ์
) โ> [https://www.dcode.fr/scytale-cipher](https://www.dcode.fr/scytale-cipher)
**25x25 = QR**
factordb.com\
rsatool
Snow --> ๊ณต๋ฐฑ๊ณผ ํญ์ ์ฌ์ฉํ์ฌ ๋ฉ์์ง ์จ๊ธฐ๊ธฐ
# Characters
%E2%80%AE => RTL ๋ฌธ์ (ํ์ด๋ก๋๋ฅผ ๊ฑฐ๊พธ๋ก ์)
{% hint style="success" %}
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks ์ง์ํ๊ธฐ
* [**๊ตฌ๋
๊ณํ**](https://github.com/sponsors/carlospolop) ํ์ธํ๊ธฐ!
* **๐ฌ [**Discord ๊ทธ๋ฃน**](https://discord.gg/hRep4RUj7f) ๋๋ [**ํ
๋ ๊ทธ๋จ ๊ทธ๋ฃน**](https://t.me/peass)์ ์ฐธ์ฌํ๊ฑฐ๋ **Twitter** ๐ฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**๋ฅผ ํ๋ก์ฐํ์ธ์.**
* **[**HackTricks**](https://github.com/carlospolop/hacktricks) ๋ฐ [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํ์ ๊ณต์ ํ์ธ์.**
{% endhint %}