Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- OEF1
- curl -s http://crl.tcs.terena.org/TERENASSLCA.crl | openssl crl -inform DER -text | grep 'Revocation' | wc -l
- OEF2
- cat id_rsa.pub >> ~/.ssh/authorized_keys
- OEF3
- ping -c $(cat /home/logs/apache_google.log | grep "/documenten/echo/08-09/" | grep ".pdf" | wc -l) localhost
- OEF4
- tshark -r ftp_bruteforce.pcap -R "ftp.request.command == PASS" -T fields -e ftp.request.arg | sort | uniq -c |sort -nr | head -3 | awk '{print $2}'
- OEF5
- in wireshark:
- http.request.method == "POST" && http.host == "debbie.vlan77.be"
- in putty :
- nc -vz debbie.vlan77.be 1-10100 2>&1 | grep 'succeeded'
- OEF6
- w | awk '{print $1,$4}' | sort -k2 | head -1
- OEF7
- PUTTY:
- tar -cvf backup.tar.gz ./ | openssl enc -aes-128-cbc -in backup.tar.gz -out backup.tar.gz.enc | nc -l 15999 < backup.tar.gz.enc
- WINDOWS:
- nc debbie.vlan77.be 15999 > backup.tar.gz.enc
- OEF8
- nc -zv4 debbie.vlan77.be 1-20000 2>&1 | grep "succeeded" | awk '{print $4}' | grep -vP '(.).*\1'
- OEF10
- var=$(tshark -r ftp_bruteforce.pcap -R "ftp.response.code==230" -T fields -e tcp.dstport) && tshark -r ftp_bruteforce.pcap -R "tcp.srcport==$var" -T fields -e ftp.request.command -e ftp.request.arg | egrep 'USER|PASS'
- ongeveer hetzelfde:
- tshark -r ftp_bruteforce.pcap -R "tcp.srcport==$(tshark -r ftp_bruteforce.pcap -R "ftp.response.code==230" -T fields -e tcp.dstport)" -T fields -e ftp.request.arg
- OEF11
- echo | openssl s_client -connect gmail.com:443 2> /dev/null | openssl x509 -text | grep DNS |sed 's/,/\n/g' | wc -l
- OEF12
- cat /usr/share/dict/dutch | grep -P "^(.)(.)\2\1$"
- OEF13
- ls -ld ~
- OEF14
- eerst listenen op random poort:
- nc -l 4321 | gpg -d
- met andere putty bericht sturen geencrypteerd door gpg -e op diezelfde poort
- echo "words" | gpg -e | nc debbie.vlan77.be 4321
- OEF15
- for f in $(find /tmp/movies -name '*.jpg'); do n=$(basename $f .jpg); cp $f ~/TEST/$n.avi;done
- OEF16
- for i in {1..10}; do ping -c 1 -t $i facebook.com| grep "From" | awk '{print $3,$2}'| sed 's/ /\n/g' | sed 's/'\('//g' | sed 's/'\)'//g' ; done
- OEF17
- for i in {8000..9000}; do wget --user=admin --password=$i debbie.vlan77.be/nw2/phonie 2>&1 | if grep -q "200"; then echo $i; fi ; done
- OEF18
- chmod 600 cert.key
- chmod 755 cert.pem
- OEF19
- tshark -r sip_dump.pcap -R dns.flags.response==0 -T fields -e dns.qry.name -e udp.dstport | sort| uniq
- OEF20
- echo 'TGludXggUlVMRVM=' | base64 -d
- OEF21
- nmap debbie.vlan77.be -r -sT
- OEF22
- openssl s_client -connect www.facebook.com:443 -showcerts 2>/dev/null | openssl x509 -pubkey -noout -fingerprint
- OEF20
- cat /home/logs/apache_google.log | awk '{print $1}' | sort | uniq -c | sort -nr | head -5
- OEF21
- tshark -r sip_dump.pcap -R dns.flags.response==0 -T fields -e udp.srcport
- OEF22
- wget http://debbie.vlan77.be/nw2/encoded | base64 --decode
- OEF23
- nmap debbie.vlan77.be -v -sV
- OEF24
- tshark -r ftp_bruteforce.pcap -R "ftp.request.command == USER" -T fields -e ftp.request.arg | sort | uniq
- OEF25
- date +"Time = %X(%d/%m/%Y)"
- OEF26
- for i in {14..16}; do echo Woorden met $i letters:; grep -E '^.{'$i'}$' /usr/share/dict/dutch |grep -v '\(.\).*\1'; done
- OEF27
- nmap 193.191.187.12/25 --exclude 192.192.187.1, 192.191.187.2
- OEF34
- tshark -r sip_dump.pcap -R sip.CSeq -T fields -e sip.CSeq.method | sort | uniq -c | sort -nr | head -3
- OEF35
- nmap 193.191.187.129/25 -b debbie.vlan77.be --max-hostgroup 20
- OEF36
- curl --silent http://encoded.rudi.vlan77.be/public.gpg | gpg --import public.gpg | gpg -e -u "seba" -r "seba" clear.txt | mv clear.txt.gpg secret.txt
- OEF37
- ssh -L 3000:randomserver.com:4444 r0430477@debbie.vlan77.be
- OEF38
- egrep '^.{5}$' /usr/share/dict/dutch |grep -Pv '(.).*\1'
- OEF39
- tshark -r ftp_bruteforce.pcap -R ftp.response.code -T fields -e ftp.response.code | sort | uniq -c | sort -nr
- OEF40
- Niet mogelijk in debby
- wel in virtual machine / linux machine I guess :
- for user in $( w | grep -v bash | tail -n+3 |uniq | awk '{print $1}'); do wget -q --no-check-certificate ${user}.webontwerp.khleuven.be/project/${user}pisw.pdf -O ${user}.pdf;done | ../dropbox_uploader.sh upload -spk *.pdf /
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement