Persistent mount for luks with unlock Key

Categories: Linux, Security, tech

creating a encrypted disk with luks our  Little problem here to mount a encrypted disk  automatically on boot so no need to enter the pass for mounting but this risky if the machine theft happen because we will use a key inside the system and it will be leaked if our machine stolen so lets … Read More

Linux Disk Encryption with LUKS

Categories: Linux, Security

today we going to make an encrypted disk partition list prepare our partition I have a new disk in  /dev/sdb I will create a partition 100 on it with fdisk [root@localhost ~]# fdisk /dev/sdb Welcome to fdisk (util-linux 2.25.2). Changes will remain in memory only, until you decide to write them. Be careful before using the … Read More

RPM integrity and scripts

Categories: Linux, Security

Yum repository comes with gpg  and md5 support to verify the validity of the package You can list installed gpg keys in your system via rpm -qa  gpg-pubkey It will show the unique id for the installed keys in your  system gpg-pubkey-e8562897-459f07a4 gpg-pubkey-217521f6-45e8a532 To list all information related to a key rpm -qi pgp-key-unique-id Name … Read More

nmap cheat sheet

Categories: Security

nmap scan sheet cheat 😀 Host Discovery nmap -PE <range> nmap -PP <range> nmap -PM <range> arp scan nmap -PR <range> Stealth Scan nmap -sS <range>   Idle Scan nmap -sI zombie <range>   Version Scan nmap -sV <range>

port forward & pivoting with meterpreter

Categories: Security, tech

Let’s assume u attacked machine with 2 nic cards our IP is 10.0.0.5 first, one ip is 10.0.0.10 that you reach it from and in ifconfig shows, the machine has a different  IP 10.0.2.30 you can scan the network 10.0.2.x via meterpreter arp_scan meterpreter > run arp_scan -r 10.0.2.1-255 we can connect to the RDP … Read More

MetaSploit Payload to Executable EXE

Categories: Security

# msfvenom No options Usage: /opt/metasploit/apps/pro/msf3/msfvenom [options] <var=val> Options: -p, –payload <payload> Payload to use. Specify a ‘-‘ or stdin to use custom payloads -l, –list [module_type] List a module type example: payloads, encoders, nops, all -n, –nopsled <length> Prepend a nopsled of [length] size on to the payload -f, –format <format> Output format (use … Read More

SMASH THE STACK LEVEL6

Categories: Security, tech

Smash The Stack  Level 6 level6@io:/levels$ ./level06 a b Hi a this app take 2 argument 1 – username 2- password it takes it then say hi also, it checks ur env language and change the msg level6@io:/levels$ export LANG=fr level6@io:/levels$ ./level06 a b Bienvenue a level6@io:/levels$ export LANG=de level6@io:/levels$ ./level06 a b Willkommen a … Read More

Get Environment Variable memory Address

Categories: Security

some time u put the shellcode inside  the environment and u will need the address of it to build ur payload here is a simple C code to get the address 1 #include <stdio.h> 2 #include <stdlib.h> 3 4 int main(int argc, char *argv[]) 5 { 6 char *nix = getenv(“NIX”); 7 printf(“%p\n”, nix); 8 … Read More

Duplicate File Finder By MD5SUM

Categories: Python, Security

Hello this is a simple script to find the duplicated files by md5sum so if u have 2 files with the same content  but with different   names, u still can catch them #duplicate file finder by file md5sum #author N1X import sys import os import subprocess from os.path import join, abspath from os import walk from … Read More

TrueCrypt Password bruteforce

Categories: Python, Security

hello, guys, this  script will simply mount the container with the password form the given password list #!/usr/bin/env python #TrueCrypt Crack Passowrd Based In Dic Attack #Author : N1X import subprocess import sys file = open(sys.argv[2]) passlist=file.readlines() for password in passlist: print password.strip() command = “truecrypt -t –non-interactive %s -p %s” %(sys.argv[1],password.strip()) p = subprocess.Popen(command,shell=True,stderr=subprocess.PIPE) … Read More