Reorganized

This commit is contained in:
Mari Wahl 2014-11-03 10:49:17 -05:00
parent ab54dc8e70
commit 2afd831662
281 changed files with 253 additions and 33 deletions

View file

@ -1,5 +1,15 @@
CTFs Archives
==============
CTFs & Wargames Archives
========================
* CSAW 2014
## 2014
### CTFs
- ASIS Final
- CSAW Quals
- Hack.lu
### Wargames
- OverTheWire: Krypton, Narnia

View file

@ -1,25 +1,82 @@
# TOOLS:
- https://www.cryptool.org/en/cryptool1-en
- frequency analyses online:
http://www.simonsingh.net/The_Black_Chamber/hintsandtips.html
http://www.xarg.org/tools/caesar-cipher/
# Cryptography
## ROT13
In the command line
## MD5
### Scripts
- Hash length extension attack
- Brute force hex digest chars
------
## SHA
### Scripts
- SHA-256 brute force
--------
## Rotation Ciphers
### Scripts
- Caesar
- Brute force rotation
- Pygenere
- Frequency analysis
### Online tools:
- Frequency analysis: [here](http://www.simonsingh.net/The_Black_Chamber/hintsandtips.html) and [here](http://www.xarg.org/tools/caesar-cipher)
### In the command line
```sh
$ VAR=$(cat data.txt)
$ echo "$VAR"
$ alias rot13="tr A-Za-z N-ZA-Mn-za-m"
$ echo "$VAR" | rot13
```
VAR=$(cat data.txt)
echo "$VAR"
alias rot13="tr A-Za-z N-ZA-Mn-za-m"
echo "$VAR" | rot13
### In Python
In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#codec-base-classes):
```python
"YRIRY GJB CNFFJBEQ EBGGRA".decode(encoding="ROT13")
```
----
## Pailier Cryptosystem
In Python we can use: ```"YRIRY GJB CNFFJBEQ EBGGRA".decode(encoding="ROT13")```
https://docs.python.org/2/library/codecs.html#codec-base-classes
### Scripts
- POC
- Primes
---
## Tools
### Scripts:
- Finding GDC
- Finding if prime
- Generate prime
- Quick Select
- XORtool
### Online
- [Cryptol](https://www.cryptool.org/en/cryptool1-en)
-----

11
Forensics/README.md Normal file
View file

@ -0,0 +1,11 @@
# Forensics
## Tools
### Scripts:
- memdump
- pdfid
- pdf-parser

View file

@ -0,0 +1,12 @@
# Linux Hacking
## SSH Hacking
- getting unencrypted ssh keys from memory
----
## Shellshock
- scripts
- POCs

View file

Before

Width:  |  Height:  |  Size: 59 KiB

After

Width:  |  Height:  |  Size: 59 KiB

Before After
Before After

22
Memory_Exploits/README.md Normal file
View file

@ -0,0 +1,22 @@
# Memory Exploits
## Assembly
- Shell spawn
----
## Buffer Overflows
- Stack overflow examples
----
## Integer Overflows
---
## Tools
---
## C-codes
- Get env variable

View file

@ -0,0 +1,24 @@
# Network and 802.11
## 802.11
- Cracking linksys
- Cracking wifi: WEP, WPA, WPA2-PSK
---
## Wireshark stuff
- Shark the ripper
- Useful commands
---
## Port Knocking
- Several scripts
---
## Netcat, Telnet, Sockets
- Example scripts

19
Other_Hackings/README.md Normal file
View file

@ -0,0 +1,19 @@
# OTHER HACKINGS
## Facebook Hacking
- Bday thanks
- Delete all comments and likes
## Useful scripts
- Binary dot symbols
- Bits to char
- Bytes to char
- Final word inside text
- untar bz2
- watch dir change
## Useful lists
- primes to 100k

View file

@ -1,8 +1,21 @@
# CTFs, Wargames, Gray Hacker & PenTesting
# My-Gray-Hacker-Resources
All in one big bag. For fun, profits, or CTFs.
## * CTFs and WARGAMES
## * CRYPTOGRAPHY
## * FORENSICS
## * LINUX HACKING
## * MEMORY EXPLOITS
## * NETWORK and 802.11
## * REVERSE ENGINEERING
## * RUBBER DUCK
## * STEGANOGRAPHY
## * WEB EXPLOITS
## * OTHER HACKINGS
All in one big bag.
[here]: https://gist.github.com/bt3gl/8e3aa9538d6122f74274
![](http://i.imgur.com/4WNqTJS.png)

View file

@ -1,26 +1,49 @@
# Tools
# Reverse Engineering
-------------
## Tools
- X86 Win32 Cheat sheet
- Intro X86
- base conversion
- Command line tricks
### Online References
[Reverse Engineering, the Book]: http://beginners.re/
# Dissasembly
----
## IDA
- Cheat sheet
-------------
## GDB
- Commands and cheat sheet
#### gdb
```
```sh
$ gcc -ggdb -o <filename> <filename>.c
```
Starting with some commands:
```
```sh
$ gdb <program name> -x <command file>
```
For example:
```
```sh
$ cat command.txt
```
set disassembly-flavor intel
disas main
```
@ -28,12 +51,10 @@ disas main
#### objdump
Display information from object files:
• Where object file can be an intermediate file
created during compilation but before linking, or a
fully linked executable
Display information from object files: Where object file can be an intermediate file
created during compilation but before linking, or a fully linked executable
```
```sh
$ objdump -d <bin>
```

Some files were not shown because too many files have changed in this diff Show more