I hereby claim:
- I am e3prom on github.
- I am e3prom (https://keybase.io/e3prom) on keybase.
- I have a public key ASDeEdU2gxUTwAsyTjq3s_tyPQH5T3ZZYWGLudhT241hpQo
To claim this, I am signing this object:
| ## Snort/Suricata Rules | |
| ## Provides additional detection of potential post-exploitation attacks, lateral-movements and C2 communication/beaconing. | |
| alert http $EXTERNAL_NET any -> $HOME_NET 5985 (msg:"[EP] Windows Remote Management (WinRM)"; flow:established,to_server; content:"POST"; http_method; content:"/wsman"; nocase; pcre:"/\/wsman/"; classtype:policy-violation; sid:9001002; rev:1; metadata:created_at 2022_11_09, updated_at 2022_11_09;) | |
| alert http $EXTERNAL_NET any -> $HOME_NET 5985 (msg:"[EP] WinRM Evil Client"; flow:established,to_server; content:"POST"; http_method; content:"Ruby WinRM Client"; nocase; http_user_agent; classtype:misc-attack; sid:9001003; rev:1; metadata:created_at 2022_11_09, updated_at 2022_11_09;) | |
| alert tls $EXTERNAL_NET any -> $HOME_NET 5986 (msg:"[EP] Windows Remote Management (WinRM) over TLS"; flow:established,to_server; content:"|1603 01|"; fast_pattern; stream_size: client, >,0; stream_size: server, >,0; classtype:policy-violation; sid:9001004; rev:1; metadata:created_at 2022_ | 
| # CentOS 8 Hardening Script (CIS Benchmark Partial) | |
| #!/bin/sh | |
| ### FILESYSTEMS | |
| /bin/echo -n '[*] Disabling unneeded filesystems... ' | |
| /bin/echo 'install cramfs /bin/true' > /etc/modprobe.d/cramfs.conf | |
| /bin/echo 'install squashfs /bin/true' > /etc/modprobe.d/squashfs.conf | |
| /bin/echo 'install udf /bin/true' > /etc/modprobe.d/udf.conf | |
| /bin/echo 'install usb-storage /bin/true' > /etc/modprobe.d/usb-storage.conf | |
| /bin/echo 'install iscsi_tcp /bin/true' > /etc/modprobe.d/iscsi_tcp.conf | |
| #/bin/echo 'install libiscsi /bin/true' >> /etc/modprobe.d/iscsi_tcp.conf | 
| #!/usr/bin/env python | |
| # Automation skeleton for IOS-XE (RESCONF) with YANG | |
| # Nicolas Chabbey <e3prom> | |
| # | |
| # conf/devices.conf: | |
| # devices: | |
| # - hostname: 10.240.0.180 | |
| # type: cisco-ios-xe | |
| # port: 443 | |
| # verify: False | 
| fn main() { | |
| // simple memory tests with integers (usually stored onto the stack). | |
| // integers Types have the Copy Traits, therefore old variables are still | |
| // available and can be referenced. | |
| let x = 1; | |
| let y = x; | |
| println!("x stored at {:p} is {}, y stored at {:p} is {}", &x, x, &y, y); | |
| // tests with immutable strings. | |
| let s1 = "immutable"; | 
I hereby claim:
To claim this, I am signing this object:
| ''' | |
| This script allow you to load a DLL using the Windows API 'LoadLibrary()' function | |
| and returns it's load and relative text section virtual memory address. | |
| You can specifiy multiple DLL files at once using the wildcard (globbing) character. | |
| Note to self: next time use argparse instead of the *limited* getopt. | |
| Coded with some love by e3prom <github.com/e3prom | |
| ''' | |
| from ctypes import windll | 
| # generic-stack-overflow-file-exploit.py | |
| # Sample exploit code for the generic-stack-overflow-file.c, available at: | |
| # https://github.com/e3prom/shellcode/blob/master/dev/generic-stack-overflow.c | |
| # | |
| # Exploitability: | |
| # There is no direct RP overwrite, however we can control the SE handler pointer at offset 808. | |
| # The SE handler pointer points to a stack pivot. | |
| # This exploit is a little bit messy, I do apologize. | |
| import struct | |
| file = 'crash.txt' |