-
Basic scan to see what ports have a valid service running on them:
nmap {host} nmap -v {host}
Pass the -v flag to print a little more information.
| Available profiles | |
| Fast scan | |
| -F -T4 --max-retries 1 | |
| Web scan | |
| -p- -sV --version-all --script "http-* and not(dos or brute)" | |
| Full Service Scan | |
| -sV --version-all -p- -sT | |
| SMB Scan |
| # aproducer.py | |
| # | |
| # Async Producer-consumer problem. | |
| # Challenge: How to implement the same functionality, but no threads. | |
| import time | |
| from collections import deque | |
| import heapq | |
| class Scheduler: |
| /* | |
| The exploit works on 19H1. | |
| It was tested with ntoskrnl version 10.0.18362.295 | |
| */ | |
| #include <Windows.h> | |
| #include <stdio.h> | |
| #include <string> | |
| #include <ntstatus.h> | |
| #include <processthreadsapi.h> |
| IDA Plugins | Preferred | Neutral | Unreviewed |
|---|
| #!/usr/bin/python | |
| #Python script that send your phone number a text as soon as Black Hat 2019 training goes live using Twilio | |
| #The script can be coupled with cronjob that runs every hour or whatever you may see fit | |
| from twilio.rest import Client | |
| import requests | |
| account_sid = '<your Twilio account SID>' | |
| auth_token = '<your Twilio authentication token>' | |
| client = Client(account_sid, auth_token) |
| #include <windows.h> | |
| #include <sys/types.h> | |
| #include <unistd.h> | |
| int main(int argc, char **argv){ | |
| //msfvenom -p windows/exec cmd=calc.exe EXITFUNC=thread -f c -v shellcode |