diff --git a/CTFs_and_WarGames/CTFs_Writeups/9447/README.md b/CTFs_and_WarGames/CTFs_Writeups/9447/README.md index c43cee5..cd8fb83 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/9447/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/9447/README.md @@ -150,7 +150,7 @@ In addition, a crucial detail is to understand how the client encrypts the comma ### The PCAP File -The last file was a **pcap** dump. When opening it with [Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html), I verified it was really short, and the content was simply a [TCP handshake](http://www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml). Right-clicking some packet and selecting *Follow TCP Stream* returned the dump of the connection suggested by the **client.py** script: +The last file was a **pcap** dump. When opening it with [Wireshark](http://go.github.io/wiresharking-for-fun-or-profit.html), I verified it was really short, and the content was simply a [TCP handshake](http://www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml). Right-clicking some packet and selecting *Follow TCP Stream* returned the dump of the connection suggested by the **client.py** script: ![cyber](http://i.imgur.com/2Y6aaW1.png) diff --git a/CTFs_and_WarGames/CTFs_Writeups/ASIS-final/crypto_paillier/paillier.md b/CTFs_and_WarGames/CTFs_Writeups/ASIS-final/crypto_paillier/paillier.md index 33d36e6..c9c1d97 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/ASIS-final/crypto_paillier/paillier.md +++ b/CTFs_and_WarGames/CTFs_Writeups/ASIS-final/crypto_paillier/paillier.md @@ -387,9 +387,9 @@ ASIS_85c9febd4c15950ab1f19a6bd7a94f87 ---- [Paillier cryptosystem]: http://en.wikipedia.org/wiki/Paillier_cryptosystem -[here]: https://github.com/bt3gl/CTFs-Gray-Hacker-and-PenTesting/tree/master/CTFs_and_WarGames/2014-ASIS-CTF/crypto_paillier +[here]: https://github.com/go-outside-labs/CTFs-Gray-Hacker-and-PenTesting/tree/master/CTFs_and_WarGames/2014-ASIS-CTF/crypto_paillier [modulo]: http://en.wikipedia.org/wiki/Modulo_operation [oracle]: http://en.wikipedia.org/wiki/Oracle_machine [ASIS CTF]: http://asis-ctf.ir/home/ [Binary search]:http://en.wikipedia.org/wiki/Binary_search_algorithm -[my scripts]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/tree/master/src/searching_and_sorting/searching \ No newline at end of file +[my scripts]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/tree/master/src/searching_and_sorting/searching \ No newline at end of file diff --git a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/cryptography/crypto-200/README.md b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/cryptography/crypto-200/README.md index 5180e9e..baf0760 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/cryptography/crypto-200/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/cryptography/crypto-200/README.md @@ -276,12 +276,12 @@ If you like this solution, take a look at my [exploit for this problem]. **Hack all the things!** [his cryptographic scheme]: http://en.wikipedia.org/wiki/Caesar_cipher -[exploit for this problem]: https://github.com/bt3gl/CTFs-Gray-Hacker-and-PenTesting/tree/master/CTFs_and_WarGames/2014-CSAW-CTF/cryptography/crypto-200 -[scripts from other authors]:https://github.com/bt3gl/CTFs-and-Hacking-Scripts-and-Tutorials/tree/master/2014-CSAW-CTF/cryptography/crypto-200/from_the_net +[exploit for this problem]: https://github.com/go-outside-labs/CTFs-Gray-Hacker-and-PenTesting/tree/master/CTFs_and_WarGames/2014-CSAW-CTF/cryptography/crypto-200 +[scripts from other authors]:https://github.com/go-outside-labs/CTFs-and-Hacking-Scripts-and-Tutorials/tree/master/2014-CSAW-CTF/cryptography/crypto-200/from_the_net [well-known table of word frequency values]: http://en.wikipedia.org/wiki/Letter_frequency [telnetlib]: https://docs.python.org/2/library/telnetlib.html [socket]: https://docs.python.org/2/library/socket.html - [own netcat script]: https://github.com/bt3gl/CTFs-and-Hacking-Scripts-and-Tutorials/blob/master/Tutorials/Useful_Scripts/netcat.py + [own netcat script]: https://github.com/go-outside-labs/CTFs-and-Hacking-Scripts-and-Tutorials/blob/master/Tutorials/Useful_Scripts/netcat.py [pygenere]: http://smurfoncrack.com/pygenere/pygenere.php [Vigenere Cipher]: http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher [online Vigenere cracker]: http://smurfoncrack.com/pygenere/ diff --git a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/README.md b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/README.md index d161b3f..c53cb4b 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/README.md @@ -990,7 +990,7 @@ endobj [MySQL database dump file]:http://dev.mysql.com/doc/refman/5.0/en/mysqldump-sql-format.html -[CSAW CTF 2014 Forensic -Obscurity]: http://bt3gl.github.io/forensics-200-obscurity.html +[CSAW CTF 2014 Forensic -Obscurity]: http://https://singularity-sh.vercel.app/forensics-200-obscurity.html [online hex-decode]: http://ddecode.com/hexdecoder/ [which we can just google]: http://phpxref.ftwr.co.uk/wordpress/wp-content/themes/twentythirteen/js/html5.js.source.html [Tailing]: http://en.wikipedia.org/wiki/Tail_(Unix) diff --git a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/fluffy/README.md b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/fluffy/README.md index 9fa4bf3..8dd1990 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/fluffy/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/CSAW-quals/forensics/fluffy/README.md @@ -547,7 +547,7 @@ endobj [MySQL database dump file]:http://dev.mysql.com/doc/refman/5.0/en/mysqldump-sql-format.html -[CSAW CTF 2014 Forensic -Obscurity]: https://gist.github.com/bt3gl/4574e99fe0f0dbdb56a9 +[CSAW CTF 2014 Forensic -Obscurity]: https://gist.github.com/Mia-Stein/4574e99fe0f0dbdb56a9 [online hex-decode]: http://ddecode.com/hexdecoder/ [which we can just google]: http://phpxref.ftwr.co.uk/wordpress/wp-content/themes/twentythirteen/js/html5.js.source.html [Tailing]: http://en.wikipedia.org/wiki/Tail_(Unix) diff --git a/CTFs_and_WarGames/CTFs_Writeups/DefCamp/README.md b/CTFs_and_WarGames/CTFs_Writeups/DefCamp/README.md index d812446..5154b3d 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/DefCamp/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/DefCamp/README.md @@ -378,4 +378,4 @@ netsh firewall set opmode mode=DISABLE. [Exif]: http://en.wikipedia.org/wiki/Exchangeable_image_file_format [writeups]: https://github.com/ctfs/write-ups/tree/master/d-ctf-2014/misc-100 [xxd]: http://linuxcommand.org/man_pages/xxd1.html -[Natas post]: http://bt3gl.github.io/exploiting-the-web-in-20-lessons-natas.html \ No newline at end of file +[Natas post]: http://https://singularity-sh.vercel.app/exploiting-the-web-in-20-lessons-natas.html \ No newline at end of file diff --git a/CTFs_and_WarGames/CTFs_Writeups/STRIPE_1-2-3/README.md b/CTFs_and_WarGames/CTFs_Writeups/STRIPE_1-2-3/README.md index 7d848b2..5a6ae8f 100644 --- a/CTFs_and_WarGames/CTFs_Writeups/STRIPE_1-2-3/README.md +++ b/CTFs_and_WarGames/CTFs_Writeups/STRIPE_1-2-3/README.md @@ -2,7 +2,7 @@ This post is about the first [Stripe](https://stripe.com/) CTF, which [happened at the beginning of 2012](https://stripe.com/blog/capture-the-flag-wrap-up). I was able to fully reproduce the game by using a [Live CD Image](http://www.janosgyerik.com/hacking-contest-on-a-live-cd/). Other options were [direct download and BitTorrent](https://stripe.com/blog/capture-the-flag-wrap-up). -This CTF was composed of 6 levels, and its style was very similar to other Wargames I've talked about before in this blog (for instance, check [OverTheWire's](http://overthewire.org/wargames/) [Natas](http://bt3gl.github.io/exploiting-the-web-in-20-lessons-natas.html), [Narnia](http://bt3gl.github.io/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html), and [Krypton](http://bt3gl.github.io/cryptography-war-beating-krypton.html)). +This CTF was composed of 6 levels, and its style was very similar to other Wargames I've talked about before in this blog (for instance, check [OverTheWire's](http://overthewire.org/wargames/) [Natas](http://https://singularity-sh.vercel.app/exploiting-the-web-in-20-lessons-natas.html), [Narnia](http://https://singularity-sh.vercel.app/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html), and [Krypton](http://https://singularity-sh.vercel.app/cryptography-war-beating-krypton.html)). @@ -215,7 +215,7 @@ int run(const char *str) ### Description of the Exploit -To understand this problem we need to understand the [design of the stack frame](http://bt3gl.github.io/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html). With this in mind, the exploit is crafted as follows: +To understand this problem we need to understand the [design of the stack frame](http://https://singularity-sh.vercel.app/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html). With this in mind, the exploit is crafted as follows: 1) We input a malicious index that is negative (so it pass the bound checking) to have a shell running ```system("/bin/sh");``` (which will be able to read password of level3 because it will have its [UID](http://en.wikipedia.org/wiki/User_identifier_(Unix))). @@ -368,7 +368,7 @@ Finally, **execve** is executed: ### Writing the Shellcode in Assembly -Now we are able to reproduce the code in Assembly. This is important: Stripe's machine was 32-bit, and the Assembly instructions are different from 64-bit (for instance, check the 64-bit shellcode I showed [here](http://bt3gl.github.io/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html)). +Now we are able to reproduce the code in Assembly. This is important: Stripe's machine was 32-bit, and the Assembly instructions are different from 64-bit (for instance, check the 64-bit shellcode I showed [here](http://https://singularity-sh.vercel.app/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html)). With an **l** added to the words, the above shellcode in 32-bit machines is: diff --git a/CTFs_and_WarGames/WARGAMES/krypton/README.md b/CTFs_and_WarGames/WARGAMES/krypton/README.md index b249f5a..ae4e238 100644 --- a/CTFs_and_WarGames/WARGAMES/krypton/README.md +++ b/CTFs_and_WarGames/WARGAMES/krypton/README.md @@ -9,11 +9,11 @@ The problems are very straightforward and very similar to those from the last [C [Cryptol]: http://www.cryptol.net/ -[Continuing to talk about]: http://bt3gl.github.io/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html +[Continuing to talk about]: http://https://singularity-sh.vercel.app/smashing-the-stack-for-fun-or-wargames-narnia-0-4.html [Wargames]: http://overthewire.org/wargames/ [Krypton]: http://overthewire.org/wargames/krypton/ [CSAW CTF]: https://ctf.isis.poly.edu/ -[see my post here]: http://bt3gl.github.io/csaw-ctf-2014-cryptography-200.html +[see my post here]: http://https://singularity-sh.vercel.app/csaw-ctf-2014-cryptography-200.html ## Level 0: Base64 Transformation diff --git a/CTFs_and_WarGames/WARGAMES/narnia/README.md b/CTFs_and_WarGames/WARGAMES/narnia/README.md index 5c447e1..4f58d36 100644 --- a/CTFs_and_WarGames/WARGAMES/narnia/README.md +++ b/CTFs_and_WarGames/WARGAMES/narnia/README.md @@ -60,8 +60,8 @@ If you think about it, a Stack is a perfect object for a process: the process ca -[Python & Algorithms]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf -[here are some examples]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks +[Python & Algorithms]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf +[here are some examples]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks @@ -171,7 +171,7 @@ EGG=0X41414141 To understand more about environments variables in exploits, take a look into my [Shellshock guide]. -[Shellshock guide]: http://bt3gl.github.io/understanding-the-shellshock-vulnerability.html +[Shellshock guide]: http://https://singularity-sh.vercel.app/understanding-the-shellshock-vulnerability.html #### Shell Commands diff --git a/CTFs_and_WarGames/WARGAMES/natas.md b/CTFs_and_WarGames/WARGAMES/natas.md index 341ca2b..0401660 100644 --- a/CTFs_and_WarGames/WARGAMES/natas.md +++ b/CTFs_and_WarGames/WARGAMES/natas.md @@ -1429,4 +1429,4 @@ That's it. The [source code is available] as usual. Hack all the things! -[source code is available]: https://github.com/bt3gl/CTFs-Gray-Hacker-and-PenTesting/tree/master/Web_Exploits +[source code is available]: https://github.com/go-outside-labs/CTFs-Gray-Hacker-and-PenTesting/tree/master/Web_Exploits diff --git a/Linux_Hacking/README.md b/Linux_Hacking/README.md index 035a1dd..6824d35 100644 --- a/Linux_Hacking/README.md +++ b/Linux_Hacking/README.md @@ -1,7 +1,6 @@ -# Bt3gl's ol'n'good Ultimate Linux Guide for Hackers +# Mia Stein's ol'n'good Ultimate Linux Guide for Hackers * I wrote this in 2013, but hey Linux is still Linux <3. -* but if you want modern Linux, [check this out](https://github.com/ibraheemdev/modern-unix)
@@ -319,7 +318,7 @@ $ export PATH=$PATH:/ * **~/.bashrc** contains scripts and variables that are executed when Bash is invoked. -* It's a good experience to customize your **~/.bashrc**. Just google for samples, or take a look at this [site dedicated for sharing dot-files](http://dotfiles.org), or at [mine](https://github.com/bt3gl/Dotfiles-and-Bash-Examples/blob/master/configs/bashrc). Don't forget to ```source``` your **./bashrc** file every time you make a change (opening a new terminal has the same effect): +* It's a good experience to customize your **~/.bashrc**. Just google for samples, or take a look at this [site dedicated for sharing dot-files](http://dotfiles.org), or at [mine](https://github.com/go-outside-labs/Dotfiles-and-Bash-Examples/blob/master/configs/bashrc). Don't forget to ```source``` your **./bashrc** file every time you make a change (opening a new terminal has the same effect): ``` $ source ~/.bashrc diff --git a/Network_and_802.11/README.md b/Network_and_802.11/README.md index a67cfe2..b6268b0 100644 --- a/Network_and_802.11/README.md +++ b/Network_and_802.11/README.md @@ -96,7 +96,7 @@ ## Useful Tools in General -- [Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) +- [Wireshark](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) - tshark - OpenVPN - OpenSSL diff --git a/Network_and_802.11/packet_scripting.md b/Network_and_802.11/packet_scripting.md index 5a655b4..adf5443 100644 --- a/Network_and_802.11/packet_scripting.md +++ b/Network_and_802.11/packet_scripting.md @@ -40,7 +40,7 @@ The basic unit in network communication is the *packet*. So let's create one! Scapy builds packets by the *layers* and then by the *fields* in each layer. Each layer is nested inside the parent layer, represented by the **<** and **>** brackets. -Let's start by specifying the packet's source IP and then its destination IP. This type of information goes in the **IP header**, which is a *layer 3 protocol* in the [0SI model](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html): +Let's start by specifying the packet's source IP and then its destination IP. This type of information goes in the **IP header**, which is a *layer 3 protocol* in the [0SI model](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html): ```python >>> ip = IP(src="192.168.1.114") @@ -481,13 +481,13 @@ Running this script when loading load some mail client (such as [Thunderbird](ht ----------- ## ARP Cache Poisoning -I talked about [ARP cache poisoning using command line arpspoof](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) in my guide about Wireshark. Here we are going to see how to implement a similar tool using Scapy. +I talked about [ARP cache poisoning using command line arpspoof](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) in my guide about Wireshark. Here we are going to see how to implement a similar tool using Scapy. ARP cache poisoning works by convincing a target machine that we are the gateway and then convincing the gateway that all traffic should pass through our machine. Every machine in a network maintains an ARP cache that stores the recent MAC addresses that match to IP addresses on the local network. All we need to do is to poison this cache with controlled entries. -The best way to test this is by using a Windows virtual machine (take a look in [this guide I wrote](http://bt3gl.github.io/setting-up-a-playing-environment-with-virtual-machines.html)). +The best way to test this is by using a Windows virtual machine (take a look in [this guide I wrote](http://https://singularity-sh.vercel.app/setting-up-a-playing-environment-with-virtual-machines.html)). Before the attack, go to the Windows box, open the terminal (```cmd```) and check the IP and gateway IP address with```ipconfig```. Then check the associated ARP cache entry MAC address with ```arp -a```. We are going to use the former information and we will see the ARP data being changed: @@ -772,4 +772,4 @@ Detected: 16 faces - [Wifitap: PoC for communication over WiFi networks using traffic injection](http://sid.rstack.org/static/articles/w/i/f/Wifitap_EN_9613.html). - [SurfJack: hijack HTTP connections to steal cookies](https://code.google.com/p/surfjack/) - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). diff --git a/Network_and_802.11/paramiko/README.md b/Network_and_802.11/paramiko/README.md index f23b826..afc0beb 100644 --- a/Network_and_802.11/paramiko/README.md +++ b/Network_and_802.11/paramiko/README.md @@ -369,4 +369,4 @@ Enter command: - [Paramikos reverse SSH tunneling](https://github.com/paramiko/paramiko/blob/master/demos/rforward.py). - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). diff --git a/Network_and_802.11/scanner/README.md b/Network_and_802.11/scanner/README.md index 454ce81..5dce9b3 100644 --- a/Network_and_802.11/scanner/README.md +++ b/Network_and_802.11/scanner/README.md @@ -2,7 +2,7 @@ When it comes to the reconnaissance of some target network, the start point is undoubtedly on host discovering. This task might come together with the ability to sniff and parse the packets flying in the network. -A few weeks ago, I talked about [how to use Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) for packet sniffing, but what if you don't have Wireshark available to monitor a network traffic? +A few weeks ago, I talked about [how to use Wireshark](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) for packet sniffing, but what if you don't have Wireshark available to monitor a network traffic? Again, Python comes with several solutions and today I'm going through the steps to build a **UDP Host discovery tool**. First, we are going to see how we deal with [raw sockets](http://en.wikipedia.org/wiki/Raw_socket) to write a simple sniffer, which is able to view and decode network packets. Then we are going to multithread this process within a subnet, which will result in our scanner. @@ -15,7 +15,7 @@ The cool thing about using **UDP datagrams** is that, differently from TCP, they ## Writing a Packet Sniffing -We start with a very simple task: with Python's [socket](http://bt3gl.github.io/black-hat-python-networking-the-socket-module.html) library, we will write a very simple packet sniffer. +We start with a very simple task: with Python's [socket](http://https://singularity-sh.vercel.app/black-hat-python-networking-the-socket-module.html) library, we will write a very simple packet sniffer. In this sniffer we create a raw socket and then we bind it to the public interface. The interface should be in **promiscuous mode**, which means that every packet that the network card sees are captured, even those that are not destined to the host. diff --git a/Network_and_802.11/scapy/README.md b/Network_and_802.11/scapy/README.md index dfe534a..4b4e202 100644 --- a/Network_and_802.11/scapy/README.md +++ b/Network_and_802.11/scapy/README.md @@ -38,7 +38,7 @@ The basic unit in a network communication is the *packet*. So let's create one Scapy builds packets by the *layers* and then by the *fields* in each layer. Each layer is nested inside the parent layer, represented by the **<** and **>** brackets. -Let's start by specifying the packet's source IP and then its destination IP. This type of information goes in the **IP header**, which is a *layer 3 protocol* in the [0SI model](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html): +Let's start by specifying the packet's source IP and then its destination IP. This type of information goes in the **IP header**, which is a *layer 3 protocol* in the [0SI model](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html): ```python >>> ip = IP(src="192.168.1.114") @@ -295,7 +295,7 @@ We can check the output with: res.summary() ``` -For more advanced stuff, check out [my script for scanning subnet in selected ports](https://github.com/bt3gl/My-Gray-Hacker-Resources/blob/master/Network_and_802.11/scapy/super_scanner.py). +For more advanced stuff, check out [my script for scanning subnet in selected ports](https://github.com/go-outside-labs/My-Gray-Hacker-Resources/blob/master/Network_and_802.11/scapy/super_scanner.py). ### The Sniff() Method @@ -568,13 +568,13 @@ Running this script when loading some mail client (such as [Thunderbird](https: ----------- ## ARP Cache Poisoning -I talked about [ARP cache poisoning using command line arpspoof](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) in my guide about Wireshark. Here we are going to see how to implement similar tool using Scapy. +I talked about [ARP cache poisoning using command line arpspoof](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) in my guide about Wireshark. Here we are going to see how to implement similar tool using Scapy. ARP cache poisoning works by convincing a target machine that we are the gateway, and then convincing the gateway that all traffic should pass through our machine. Every machine in a network maintains an ARP cache that stores the recent MAC addresses that match to IP addresses on the local network. All we need to do is to poison this cache with controlled entries. -The best way to test this is using a Windows virtual machine (take a look at [this guide I wrote](http://bt3gl.github.io/setting-up-a-playing-environment-with-virtual-machines.html)). +The best way to test this is using a Windows virtual machine (take a look at [this guide I wrote](http://https://singularity-sh.vercel.app/setting-up-a-playing-environment-with-virtual-machines.html)). Before the attack, go to the Windows box, open the terminal (```cmd```) and check the IP and gateway IP address with```ipconfig```. Then check the associated ARP cache entry MAC address with ```arp -a```: diff --git a/Network_and_802.11/socket/README.md b/Network_and_802.11/socket/README.md index a25d2c2..b5ffdd7 100644 --- a/Network_and_802.11/socket/README.md +++ b/Network_and_802.11/socket/README.md @@ -498,7 +498,7 @@ Cool, huh? ## A TCP Proxy -A TCP proxy can be very useful for forwarding traffic and when assessing network-based softwares (for example, when you cannot run [Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) or you cannot load drivers or tools in the machine you are exploiting). +A TCP proxy can be very useful for forwarding traffic and when assessing network-based softwares (for example, when you cannot run [Wireshark](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) or you cannot load drivers or tools in the machine you are exploiting). To create a proxy we need to verify if we need to *first initiate a connection* to the remote side. This will request data before going into our main loop and some server daemons expect you to do this first (for instance, FTP servers send a banner first). We call this information **receive_first**. @@ -730,7 +730,7 @@ Additionally, let's take a quick look to all the methods available with the **s - [Python's Socket Documentation](https://docs.python.org/2/library/socket.html) - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). - [A TCP Packet Injection tool](https://github.com/OffensivePython/Pinject/blob/master/pinject.py). - [An asynchronous HTTP Proxy](https://github.com/OffensivePython/PyProxy/blob/master/PyProxy.py). - [A network sniffer at the Network Layer](https://github.com/OffensivePython/Sniffy/blob/master/Sniffy.py). diff --git a/Network_and_802.11/socket_scripting.md b/Network_and_802.11/socket_scripting.md index 74a6ec3..d6c375c 100644 --- a/Network_and_802.11/socket_scripting.md +++ b/Network_and_802.11/socket_scripting.md @@ -497,7 +497,7 @@ Cool, huh? ## A TCP Proxy -A TCP proxy can be very useful for forwarding traffic and when assessing network-based software (for example, when you cannot run [Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html), or you cannot load drivers or tools in the machine you are exploiting). +A TCP proxy can be very useful for forwarding traffic and when assessing network-based software (for example, when you cannot run [Wireshark](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html), or you cannot load drivers or tools in the machine you are exploiting). To create a proxy we need to verify if we need to *first initiate a connection* to the remote side. This will request data before going into our main loop, and some server daemons expect you to do this first (for instance, FTP servers send a banner first). We call this information **receive_first**. @@ -725,7 +725,7 @@ Additionally, let's take a quick look to all the methods available with the **so - [Python's Socket Documentation](https://docs.python.org/2/library/socket.html) - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). - [A TCP Packet Injection tool](https://github.com/OffensivePython/Pinject/blob/master/pinject.py). - [An asynchronous HTTP Proxy](https://github.com/OffensivePython/PyProxy/blob/master/PyProxy.py). - [A network sniffer at the Network Layer](https://github.com/OffensivePython/Sniffy/blob/master/Sniffy.py). diff --git a/Network_and_802.11/ssh_scripting.md b/Network_and_802.11/ssh_scripting.md index 41017d4..b92ead1 100644 --- a/Network_and_802.11/ssh_scripting.md +++ b/Network_and_802.11/ssh_scripting.md @@ -362,4 +362,4 @@ Enter command: - [Paramikos reverse SSH tunneling](https://github.com/paramiko/paramiko/blob/master/demos/rforward.py). - [Ogre: port scanner and brute-force tool (from a friend I met at Hacker School)](https://github.com/tristanfisher/ogre/blob/master/ogre) - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). diff --git a/Network_and_802.11/udp_scanner.md b/Network_and_802.11/udp_scanner.md index 88a6e14..0a2e789 100644 --- a/Network_and_802.11/udp_scanner.md +++ b/Network_and_802.11/udp_scanner.md @@ -14,7 +14,7 @@ Remember that ICMP is essentially a special control protocol that issues error r ## Writing a Packet Sniffer -We start with a very simple task: with Python's [socket](http://bt3gl.github.io/black-hat-python-networking-the-socket-module.html) library, we will write a very simple packet sniffer. +We start with a very simple task: with Python's [socket](http://https://singularity-sh.vercel.app/black-hat-python-networking-the-socket-module.html) library, we will write a very simple packet sniffer. In this sniffer, we create a raw socket and then we bind it to the public interface. The interface should be in **promiscuous mode**, which means that every packet that the network card sees is captured, even those that are not destined to the host. @@ -316,4 +316,4 @@ Host up: 192.168.1.114 - [Tutorial to learn netaddr](https://netaddr.readthedocs.org/en/latest/tutorial_01.html). - [Black Hat Python](http://www.nostarch.com/blackhatpython). -- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources). \ No newline at end of file +- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources). \ No newline at end of file diff --git a/Network_and_802.11/wireshark_stuff/README.md b/Network_and_802.11/wireshark_stuff/README.md index 05fb4f7..0d4efae 100644 --- a/Network_and_802.11/wireshark_stuff/README.md +++ b/Network_and_802.11/wireshark_stuff/README.md @@ -3,7 +3,7 @@ [Wireshark](https://www.wireshark.org/) is an open source **network packet analyzer** that allows live traffic analysis, with support to several protocols. -Wireshark also allows **network forensic**, being very useful for CTFs for example (check my writeups for the [D-CTF Quals 2014](http://bt3gl.github.io/exploring-d-ctf-quals-2014s-exploits.html) and for the CSAW Quals 2014 in [Networking](http://bt3gl.github.io/csaw-ctf-2014-networking-100-big-data.html) and [Forensics](http://bt3gl.github.io/csaw-ctf-2014-forensics-200-why-not-sftp.html)). +Wireshark also allows **network forensic**, being very useful for CTFs for example (check my writeups for the [D-CTF Quals 2014](http://https://singularity-sh.vercel.app/exploring-d-ctf-quals-2014s-exploits.html) and for the CSAW Quals 2014 in [Networking](http://https://singularity-sh.vercel.app/csaw-ctf-2014-networking-100-big-data.html) and [Forensics](http://https://singularity-sh.vercel.app/csaw-ctf-2014-forensics-200-why-not-sftp.html)). diff --git a/Other_Hackings/Rubber_Duck/README.md b/Other_Hackings/Rubber_Duck/README.md index df5fe53..bf5fbc7 100644 --- a/Other_Hackings/Rubber_Duck/README.md +++ b/Other_Hackings/Rubber_Duck/README.md @@ -6,8 +6,6 @@ This is a repository with all the hacks I have created. In the folder HAK I left the original repository from Hak5. -In the folder bt3gl I left my hacks. - The Duck --------- diff --git a/README.md b/README.md index c4ba074..28f63f7 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ #### 👾 some context of those *good old days*: - **👉🏽 my two teams in ctf times: [snatch the root](https://ctftime.org/team/7016) and [hacking for soju](https://ctftime.org/team/3208).** - **[👉🏽 my former blog, "chmod a+x singularity.sh", with several ctf writeups](https://singularity-sh.vercel.app/).** - - **[👉🏽 my coderwall page with several writeups on linux, security, python](https://coderwall.com/bt3gl).** + - **[👉🏽 my 2014's coderwall page with several writeups on linux, security, python](https://coderwall.com/bt3gl).** - **[👉🏽 some entertaining: my DEF CON 23 talk on hacking quantum computing](https://www.youtube.com/watch?v=1Fp6ibfOQ4Y).** - **[👉🏽 a proof that this repo used to have 1.2k stars and 500 forks before I had to make it private](FML.png).** - **[👉🏽 threat-intel, i project i led while working at the security team at yelp](https://github.com/Yelp/threat_intel)**. diff --git a/Vulnerabilities_and_Exploits/Memory_Exploits/Buffer_overflows/stack_overflow_narnia.md b/Vulnerabilities_and_Exploits/Memory_Exploits/Buffer_overflows/stack_overflow_narnia.md index ea05977..7014790 100644 --- a/Vulnerabilities_and_Exploits/Memory_Exploits/Buffer_overflows/stack_overflow_narnia.md +++ b/Vulnerabilities_and_Exploits/Memory_Exploits/Buffer_overflows/stack_overflow_narnia.md @@ -62,8 +62,8 @@ If you think about it, a Stack is the perfect object for a process: the process -[Python & Algorithms]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf -[here are some examples]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks +[Python & Algorithms]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf +[here are some examples]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks @@ -171,7 +171,7 @@ EGG=0X41414141 To understand more about environments variables in exploits, take a look into my [Shellshock guide]. -[Shellshock guide]: http://bt3gl.github.io/understanding-the-shellshock-vulnerability.html +[Shellshock guide]: http://https://singularity-sh.vercel.app/understanding-the-shellshock-vulnerability.html #### Shell Commands diff --git a/Web_Hacking/urllib2/README.md b/Web_Hacking/urllib2/README.md index a263024..f63137d 100644 --- a/Web_Hacking/urllib2/README.md +++ b/Web_Hacking/urllib2/README.md @@ -1,6 +1,6 @@ # Hacking the Web with Python's urllib2 (by bt3) -Python's [urllib2](https://docs.python.org/2/library/urllib2.html) library is **the tool** to interact with web services, with several functions and classes to help handling URLs. **urllib2** is written in the top of [httplib](https://docs.python.org/2/library/httplib.html) library (which defines classes to implement the client side of HTTP and HTTPs). In turn, **httplib** uses the [socket](http://bt3gl.github.io/black-hat-python-networking-the-socket-module.html) library. +Python's [urllib2](https://docs.python.org/2/library/urllib2.html) library is **the tool** to interact with web services, with several functions and classes to help handling URLs. **urllib2** is written in the top of [httplib](https://docs.python.org/2/library/httplib.html) library (which defines classes to implement the client side of HTTP and HTTPs). In turn, **httplib** uses the [socket](http://https://singularity-sh.vercel.app/black-hat-python-networking-the-socket-module.html) library. In this post I [introduce urllib2](#intro) and then I work on two problems: [mapping webapps from their installation files](#map) and [brute-forcing the contents of webapps to find hidden resources](#brute1). @@ -25,7 +25,7 @@ Let's see how a simple [GET](http://www.w3schools.com/tags/ref_httpmethods.asp)