passwd

pspy – unprivileged linux process snooping

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea. The tool gathers it’s info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes. Getting started Get the tool onto the Linux machine you want to inspect. First get the […]


Dejavu: audio fingerprinting and recognition in Python

1 Star2 Stars3 Stars4 Stars5 Stars (6 votes, average: 3.17 out of 5)
Loading...

Audio fingerprinting and recognition algorithm implemented in Python, see the explanation here: How it works Dejavu can memorize audio by listening to it once and fingerprinting it. Then by playing a song and recording microphone input, Dejavu attempts to match the audio against the fingerprints held in the database, returning the song being played. Note that for voice recognition, Dejavu is not the right tool! Dejavu excels at recognition of exact signals with reasonable amounts of noise. Installation and Dependencies: Read INSTALLATION.md Setup First, install the above dependencies. Second, you’ll need to create a MySQL database where Dejavu can store fingerprints. […]


Extraer el fichero passwd mediante Metasploit utilizando un exploit para la aplicación vsftpd desde PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...


BusyBox – The Swiss Army Knife of Embedded Linux

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

INFORMATION ABOUT BUSYBOX https://busybox.net/downloads/BusyBox.html SYNTAX

DESCRIPTION BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides minimalist replacements for most of the utilities you usually find in GNU coreutils, util-linux, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts. BusyBox has been written with size-optimization and limited resources in mind. It is also extremely modular so you can easily include or exclude commands (or features) at compile time. This makes […]


Comandos básicos Linux

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...


John the Ripper

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Pruebas de rendimiento para John the Ripper

Recuperar una contraseña con John the Ripper Almacenar la contraseña en un archivo (passwd)

Ejecutar John the Ripper

Recuperar una contraseña con John the Ripper utilizando un diccionario de claves Almacenar la contraseña en un archivo (passwd)

Ejecutar John the Ripper


Restore a MySQL database

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Zcat decompresses the data of all the input files, and writes the result on the standard output.


Sistemas operativos monopuesto

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 4.00 out of 5)
Loading...

Índice Introducción a los sistemas informáticos Introducción a los sistemas operativos Instalación de sistemas operativos Configuración de máquinas virtuales Virtualización Definición Características Tipos de virtualización Ventajas e inconvenientes Máquinas virtuales Definición Características Ventajas e inconvenientes Software para crear máquinas virtuales Creación y configuración de máquinas virtuales Instalación de un sistema operativo en una máquina virtual Tareas básicas I Introducción Interfaces Modo texto Modo gráfico Utilidades del sistema Explorador de archivos La búsqueda Ejecutar Otras aplicaciones Tareas básicas II Introducción a los sistemas de archivos Archivos Tipos Propiedades Operaciones Directorios Propiedades Estructura Operaciones Tareas de administración I Introducción Agregar/Eliminar software Introducción […]


Buscar entradas en los log sobre FHScan+Core+1.1

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Busca estas rutas: