Latest notes for PenTesting- MrLeet


MrLeet provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Title: winenum.bat
By: unknowndevice64 2019-05-18 13:26:53

@echo OFF
echo ----------------------------------------------
echo Windows Enumeration Script v1.1
echo ----------------------------------------------
echo By absolomb
echo ----------------------------------------------
echo creating temp folder to dump output at C:\temp
mkdir C:\temp
echo.
set OS=1
echo.
echo 1: Vista/2003SP2 and newer...


Score: 0


The time to crack a password is related to bit strength, which is a measure of the password's entropy and the details of how the password is stored. Most methods of password cracking require the computer to produce many candidate passwords, each of which is checked. One example is brute-force cracking, in which a computer tries every possible ...


Score: 0


If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell.

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding a shell to a TCP port...


Score: 0


It is imperative that a scout should know the history, tradition, religion, social customs, and superstitions of whatever country or people he is called on to work in or among. This is almost as necessary as to know the physical character of the country, its climate and products. Certain people will do certain things almost without fail. Certain ot...


Score: 0


If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.

**— **Fred Durst

It can take...


Score: 0

By: unknowndevice64 2019-05-18 13:27:13

#!/usr/bin/python2
"""
Reverse Connect UDP PTY Shell - testing version
infodox - insecurety.net (2013)
Please note this may not work and I need to clean it up.
It is also COMPLETELY untested as right now I do not have a
linux box to test it on. I will do so later today.
Gives a reverse connect PTY over UDP.
For an excellent l...


Score: 0

By: unknowndevice64 2019-05-18 13:27:17

#!/usr/bin/python2
"""
Python Bind TCP PTY Shell - testing version
infodox - insecurety.net (2013)
Binds a PTY to a TCP port on the host it is ran on.
"""
import os
import pty
import socket

lport = 31337 # XXX: CHANGEME

def main():
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
s.bind((�...


Score: 0

By: unknowndevice64 2019-05-18 13:27:20

#!/usr/bin/python2
"""
Python Bind TCP PTY Shell - testing version
infodox - insecurety.net (2013)
Binds a PTY to a TCP port on the host it is ran on.
"""
import os
import pty
import socket

lport = 31337 # XXX: CHANGEME

def main():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind((&#...


Score: 0

By: unknowndevice64 2019-05-18 13:27:24

#!/usr/bin/env python2
import termios
import select
import socket
import os
import fcntl
import argparse

class PTY:
def __init__(self, slave=0, pid=os.getpid()):
# apparently python GC's modules before class instances so, here
# we have some hax to ensure we can restore the terminal state.
self.termios,...


Score: 0

By: unknowndevice64 2019-05-18 13:27:28

#!/usr/bin/python2
"""
Reverse Connect TCP PTY Shell - v1.0
infodox - insecurety.net (2013)
Gives a reverse connect PTY over TCP.
For an excellent listener use the following socat command:
socat file:`tty`,echo=0,raw tcp4-listen:PORT
Or use the included tcp_pty_shell_handler.py
"""
import os
import pty
impor...


Score: 0