mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 20:53:37 +00:00
86 lines
4.2 KiB
Markdown
86 lines
4.2 KiB
Markdown
{% hint style="success" %}
|
|
Leer & oefen AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Opleiding AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Leer & oefen GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Opleiding GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Ondersteun HackTricks</summary>
|
|
|
|
* Kyk na die [**subskripsie planne**](https://github.com/sponsors/carlospolop)!
|
|
* **Sluit aan by die** 💬 [**Discord groep**](https://discord.gg/hRep4RUj7f) of die [**telegram groep**](https://t.me/peass) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks**](https://github.com/carlospolop/hacktricks) en [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|
|
|
</details>
|
|
{% endhint %}
|
|
|
|
|
|
In 'n ping antwoord TTL:\
|
|
127 = Windows\
|
|
254 = Cisco\
|
|
Die res, 'n paar linux
|
|
|
|
$1$- md5\
|
|
$2$of $2a$ - Blowfish\
|
|
$5$- sha256\
|
|
$6$- sha512
|
|
|
|
As jy nie weet wat agter 'n diens is nie, probeer om 'n HTTP GET versoek te maak.
|
|
|
|
**UDP Skande**\
|
|
nc -nv -u -z -w 1 \<IP> 160-16
|
|
|
|
'n Leë UDP-pakket word na 'n spesifieke poort gestuur. As die UDP-poort oop is, word daar geen antwoord van die teikenmasjien teruggestuur nie. As die UDP-poort gesluit is, moet 'n ICMP-poort onbereikbaar pakket van die teikenmasjien teruggestuur word.\
|
|
|
|
UDP-poort skandering is dikwels onbetroubaar, aangesien vuurmure en routers ICMP\
|
|
pakkette kan laat val. Dit kan lei tot vals positiewe in jou skandering, en jy sal gereeld\
|
|
UDP-poort skanderings sien wat alle UDP-poorte oop op 'n gescande masjien toon.\
|
|
o Meeste poort skandeerders skandeer nie alle beskikbare poorte nie, en het gewoonlik 'n vooraf ingestelde lys\
|
|
van “interessante poorte” wat geskandeer word.
|
|
|
|
# CTF - Truuks
|
|
|
|
In **Windows** gebruik **Winzip** om na lêers te soek.\
|
|
**Alternatiewe data Strome**: _dir /r | find ":$DATA"_\
|
|
```
|
|
binwalk --dd=".*" <file> #Extract everything
|
|
binwalk -M -e -d=10000 suspicious.pdf #Extract, look inside extracted files and continue extracing (depth of 10000)
|
|
```
|
|
## Crypto
|
|
|
|
**featherduster**\
|
|
|
|
|
|
**Basae64**(6—>8) —> 0...9, a...z, A…Z,+,/\
|
|
**Base32**(5 —>8) —> A…Z, 2…7\
|
|
**Base85** (Ascii85, 7—>8) —> 0...9, a...z, A...Z, ., -, :, +, =, ^, !, /, \*, ?, &, <, >, (, ), \[, ], {, }, @, %, $, #\
|
|
**Uuencode** --> Begin met "_begin \<mode> \<filename>_" en vreemde karakters\
|
|
**Xxencoding** --> Begin met "_begin \<mode> \<filename>_" en B64\
|
|
\
|
|
**Vigenere** (frekwensie analise) —> [https://www.guballa.de/vigenere-solver](https://www.guballa.de/vigenere-solver)\
|
|
**Scytale** (verskuiwing van karakters) —> [https://www.dcode.fr/scytale-cipher](https://www.dcode.fr/scytale-cipher)
|
|
|
|
**25x25 = QR**
|
|
|
|
factordb.com\
|
|
rsatool
|
|
|
|
Snow --> Versteek boodskappe met spaties en tabulatoren
|
|
|
|
# Characters
|
|
|
|
%E2%80%AE => RTL Karakter (skryf payloads agterstewe)
|
|
|
|
{% hint style="success" %}
|
|
Leer & oefen AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Leer & oefen GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Support HackTricks</summary>
|
|
|
|
* Check die [**subskripsie planne**](https://github.com/sponsors/carlospolop)!
|
|
* **Sluit aan by die** 💬 [**Discord groep**](https://discord.gg/hRep4RUj7f) of die [**telegram groep**](https://t.me/peass) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks**](https://github.com/carlospolop/hacktricks) en [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|
|
|
</details>
|
|
{% endhint %}
|