Reorganized
|
@ -1,5 +1,15 @@
|
|||
CTFs Archives
|
||||
==============
|
||||
CTFs & Wargames Archives
|
||||
========================
|
||||
|
||||
* CSAW 2014
|
||||
## 2014
|
||||
|
||||
|
||||
### CTFs
|
||||
- ASIS Final
|
||||
- CSAW Quals
|
||||
- Hack.lu
|
||||
|
||||
|
||||
### Wargames
|
||||
- OverTheWire: Krypton, Narnia
|
||||
|
||||
|
|
Before Width: | Height: | Size: 1.5 KiB After Width: | Height: | Size: 1.5 KiB |
Before Width: | Height: | Size: 7.4 KiB After Width: | Height: | Size: 7.4 KiB |
Before Width: | Height: | Size: 1.3 KiB After Width: | Height: | Size: 1.3 KiB |
Before Width: | Height: | Size: 1.1 KiB After Width: | Height: | Size: 1.1 KiB |
|
@ -1,25 +1,82 @@
|
|||
# TOOLS:
|
||||
|
||||
- https://www.cryptool.org/en/cryptool1-en
|
||||
|
||||
- frequency analyses online:
|
||||
http://www.simonsingh.net/The_Black_Chamber/hintsandtips.html
|
||||
http://www.xarg.org/tools/caesar-cipher/
|
||||
# Cryptography
|
||||
|
||||
|
||||
## ROT13
|
||||
|
||||
In the command line
|
||||
## MD5
|
||||
|
||||
|
||||
### Scripts
|
||||
|
||||
- Hash length extension attack
|
||||
- Brute force hex digest chars
|
||||
|
||||
|
||||
|
||||
------
|
||||
|
||||
## SHA
|
||||
|
||||
|
||||
### Scripts
|
||||
- SHA-256 brute force
|
||||
|
||||
|
||||
--------
|
||||
|
||||
## Rotation Ciphers
|
||||
|
||||
|
||||
### Scripts
|
||||
- Caesar
|
||||
- Brute force rotation
|
||||
- Pygenere
|
||||
- Frequency analysis
|
||||
|
||||
|
||||
### Online tools:
|
||||
|
||||
- Frequency analysis: [here](http://www.simonsingh.net/The_Black_Chamber/hintsandtips.html) and [here](http://www.xarg.org/tools/caesar-cipher)
|
||||
|
||||
### In the command line
|
||||
|
||||
```sh
|
||||
$ VAR=$(cat data.txt)
|
||||
$ echo "$VAR"
|
||||
$ alias rot13="tr A-Za-z N-ZA-Mn-za-m"
|
||||
$ echo "$VAR" | rot13
|
||||
```
|
||||
VAR=$(cat data.txt)
|
||||
echo "$VAR"
|
||||
alias rot13="tr A-Za-z N-ZA-Mn-za-m"
|
||||
echo "$VAR" | rot13
|
||||
### In Python
|
||||
|
||||
In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#codec-base-classes):
|
||||
|
||||
```python
|
||||
"YRIRY GJB CNFFJBEQ EBGGRA".decode(encoding="ROT13")
|
||||
```
|
||||
----
|
||||
|
||||
## Pailier Cryptosystem
|
||||
|
||||
In Python we can use: ```"YRIRY GJB CNFFJBEQ EBGGRA".decode(encoding="ROT13")```
|
||||
https://docs.python.org/2/library/codecs.html#codec-base-classes
|
||||
### Scripts
|
||||
|
||||
- POC
|
||||
- Primes
|
||||
|
||||
---
|
||||
|
||||
## Tools
|
||||
|
||||
### Scripts:
|
||||
|
||||
- Finding GDC
|
||||
- Finding if prime
|
||||
- Generate prime
|
||||
- Quick Select
|
||||
- XORtool
|
||||
|
||||
|
||||
### Online
|
||||
|
||||
- [Cryptol](https://www.cryptool.org/en/cryptool1-en)
|
||||
|
||||
-----
|
||||
|
||||
|
|
11
Forensics/README.md
Normal file
|
@ -0,0 +1,11 @@
|
|||
# Forensics
|
||||
|
||||
|
||||
## Tools
|
||||
|
||||
### Scripts:
|
||||
|
||||
- memdump
|
||||
- pdfid
|
||||
- pdf-parser
|
||||
|
|
@ -0,0 +1,12 @@
|
|||
# Linux Hacking
|
||||
|
||||
## SSH Hacking
|
||||
|
||||
- getting unencrypted ssh keys from memory
|
||||
|
||||
|
||||
----
|
||||
## Shellshock
|
||||
|
||||
- scripts
|
||||
- POCs
|
Before Width: | Height: | Size: 59 KiB After Width: | Height: | Size: 59 KiB |
22
Memory_Exploits/README.md
Normal file
|
@ -0,0 +1,22 @@
|
|||
# Memory Exploits
|
||||
|
||||
## Assembly
|
||||
|
||||
- Shell spawn
|
||||
|
||||
|
||||
----
|
||||
## Buffer Overflows
|
||||
|
||||
- Stack overflow examples
|
||||
|
||||
----
|
||||
## Integer Overflows
|
||||
|
||||
---
|
||||
## Tools
|
||||
|
||||
---
|
||||
## C-codes
|
||||
|
||||
- Get env variable
|
24
Network_and_802.11/README.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Network and 802.11
|
||||
|
||||
## 802.11
|
||||
|
||||
- Cracking linksys
|
||||
- Cracking wifi: WEP, WPA, WPA2-PSK
|
||||
|
||||
---
|
||||
|
||||
## Wireshark stuff
|
||||
|
||||
- Shark the ripper
|
||||
- Useful commands
|
||||
|
||||
---
|
||||
## Port Knocking
|
||||
|
||||
- Several scripts
|
||||
|
||||
---
|
||||
## Netcat, Telnet, Sockets
|
||||
|
||||
- Example scripts
|
||||
|
|
@ -1,4 +1,4 @@
|
|||
#
|
||||
# Useful
|
||||
|
||||
## Recon
|
||||
|
19
Other_Hackings/README.md
Normal file
|
@ -0,0 +1,19 @@
|
|||
# OTHER HACKINGS
|
||||
|
||||
## Facebook Hacking
|
||||
|
||||
- Bday thanks
|
||||
- Delete all comments and likes
|
||||
|
||||
## Useful scripts
|
||||
|
||||
- Binary dot symbols
|
||||
- Bits to char
|
||||
- Bytes to char
|
||||
- Final word inside text
|
||||
- untar bz2
|
||||
- watch dir change
|
||||
|
||||
## Useful lists
|
||||
|
||||
- primes to 100k
|
19
README.md
|
@ -1,8 +1,21 @@
|
|||
# CTFs, Wargames, Gray Hacker & PenTesting
|
||||
# My-Gray-Hacker-Resources
|
||||
|
||||
All in one big bag. For fun, profits, or CTFs.
|
||||
|
||||
|
||||
## * CTFs and WARGAMES
|
||||
## * CRYPTOGRAPHY
|
||||
## * FORENSICS
|
||||
## * LINUX HACKING
|
||||
## * MEMORY EXPLOITS
|
||||
## * NETWORK and 802.11
|
||||
## * REVERSE ENGINEERING
|
||||
## * RUBBER DUCK
|
||||
## * STEGANOGRAPHY
|
||||
## * WEB EXPLOITS
|
||||
## * OTHER HACKINGS
|
||||
|
||||
All in one big bag.
|
||||
|
||||
|
||||
[here]: https://gist.github.com/bt3gl/8e3aa9538d6122f74274
|
||||
|
||||

|
||||
|
|
|
@ -1,26 +1,49 @@
|
|||
# Tools
|
||||
# Reverse Engineering
|
||||
|
||||
|
||||
-------------
|
||||
|
||||
## Tools
|
||||
|
||||
- X86 Win32 Cheat sheet
|
||||
- Intro X86
|
||||
- base conversion
|
||||
- Command line tricks
|
||||
|
||||
### Online References
|
||||
|
||||
[Reverse Engineering, the Book]: http://beginners.re/
|
||||
|
||||
|
||||
# Dissasembly
|
||||
----
|
||||
|
||||
## IDA
|
||||
|
||||
- Cheat sheet
|
||||
|
||||
|
||||
-------------
|
||||
|
||||
## GDB
|
||||
|
||||
- Commands and cheat sheet
|
||||
|
||||
|
||||
|
||||
#### gdb
|
||||
```
|
||||
```sh
|
||||
$ gcc -ggdb -o <filename> <filename>.c
|
||||
|
||||
```
|
||||
|
||||
Starting with some commands:
|
||||
```
|
||||
```sh
|
||||
$ gdb <program name> -x <command file>
|
||||
```
|
||||
|
||||
For example:
|
||||
```
|
||||
```sh
|
||||
$ cat command.txt
|
||||
```
|
||||
set disassembly-flavor intel
|
||||
disas main
|
||||
```
|
||||
|
@ -28,12 +51,10 @@ disas main
|
|||
|
||||
#### objdump
|
||||
|
||||
Display information from object files:
|
||||
• Where object file can be an intermediate file
|
||||
created during compilation but before linking, or a
|
||||
fully linked executable
|
||||
Display information from object files: Where object file can be an intermediate file
|
||||
created during compilation but before linking, or a fully linked executable
|
||||
|
||||
```
|
||||
```sh
|
||||
$ objdump -d <bin>
|
||||
```
|
||||
|
||||
|
|