mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-27 19:16:08 -04:00
some small fixes
This commit is contained in:
parent
a50737bc6b
commit
52067188ed
6
Forensics/memdump.md
Normal file
6
Forensics/memdump.md
Normal file
@ -0,0 +1,6 @@
|
||||
## memory dump
|
||||
|
||||
```
|
||||
strings /tmp/mem.dump | grep BOOT_
|
||||
BOOT_IMAGE=/vmlinuz-3.5.0-23-generic
|
||||
```
|
BIN
Images/image.png
Normal file
BIN
Images/image.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
Images/out_image.png
Normal file
BIN
Images/out_image.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 40 KiB |
27
Images/sudoku.py
Normal file
27
Images/sudoku.py
Normal file
@ -0,0 +1,27 @@
|
||||
from PIL import Image
|
||||
|
||||
|
||||
# solved sudoku
|
||||
sudoku = '''
|
||||
964127538
|
||||
712385694
|
||||
385496712
|
||||
491578263
|
||||
238614975
|
||||
576239841
|
||||
627843159
|
||||
153962487
|
||||
849751326
|
||||
'''
|
||||
s = sudoku.replace('\n', '')
|
||||
|
||||
image = Image.open('image.png').convert('RGB')
|
||||
out = Image.new('RGB', image.size)
|
||||
|
||||
for j in range(9):
|
||||
for i in range(9):
|
||||
img_cell = image.crop((i * 50, j * 50, i * 50 + 50, j * 50 + 50))
|
||||
c = (int(s[j * 9 + i]) - 1) * 50
|
||||
out.paste(img_cell, (c, j * 50))
|
||||
|
||||
out.save('out_image.png')
|
14
Network/wireshark_stuff.md
Normal file
14
Network/wireshark_stuff.md
Normal file
@ -0,0 +1,14 @@
|
||||
#
|
||||
|
||||
## Recon
|
||||
|
||||
* Statistics -> Conversations
|
||||
-> Some SSH, HTTP
|
||||
|
||||
|
||||
## Filters
|
||||
* Filer on HTTP:
|
||||
|
||||
```
|
||||
ip.addr==172.16.133.133 && tcp.port==52694 && ip.addr==172.16.133.149 && tcp.port==80
|
||||
```
|
@ -6,3 +6,5 @@ More [here].
|
||||
|
||||
|
||||
[here]: https://gist.github.com/bt3gl/8e3aa9538d6122f74274
|
||||
|
||||

|
14
Useful_Scripts/bits_to_char.py
Normal file
14
Useful_Scripts/bits_to_char.py
Normal file
@ -0,0 +1,14 @@
|
||||
# read data
|
||||
data = []
|
||||
with open('hidden-message.pcap', 'rb') as f:
|
||||
data = f.read()
|
||||
|
||||
# get bits
|
||||
bits = ''
|
||||
for i in xrange(75, len(data), 81):
|
||||
bits += '0' if data[i:i+1]=='I' else '1'
|
||||
# convert to chars
|
||||
flag = ''
|
||||
for i in xrange(0, len(bits), 8):
|
||||
flag += chr(int(bits[i:i+8], 2))
|
||||
print flag
|
2
Useful_Scripts/bytes_to_char.py
Normal file
2
Useful_Scripts/bytes_to_char.py
Normal file
@ -0,0 +1,2 @@
|
||||
print ''.join(map(chr, [0x20, 0x64, 0x65, 0x36, 0x38, 0x33, 0x38, 0x32, 0x35, 0x32, 0x66, 0x39, 0x35, 0x64, 0x33, 0x62, 0x39, 0x65, 0x38, 0x30, 0x33, 0x62, 0x32, 0x38, 0x64, 0x66, 0x33, 0x33, 0x62, 0x34, 0x62, 0x61, 0x61, 0x00]))
|
||||
|
BIN
ctf_tools_1_light_sd.png
Normal file
BIN
ctf_tools_1_light_sd.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 184 KiB |
Loading…
x
Reference in New Issue
Block a user