java reversing
This commit is contained in:
parent
9d78c9be30
commit
b6708156ab
|
@ -94,3 +94,9 @@
|
||||||
[submodule "exploit/web/xxe/xxeserv"]
|
[submodule "exploit/web/xxe/xxeserv"]
|
||||||
path = exploit/web/xxe/xxeserv
|
path = exploit/web/xxe/xxeserv
|
||||||
url = https://github.com/staaldraad/xxeserv.git
|
url = https://github.com/staaldraad/xxeserv.git
|
||||||
|
[submodule "reverse_engineering/SCDBG"]
|
||||||
|
path = reverse_engineering/SCDBG
|
||||||
|
url = https://github.com/dzzie/SCDBG.git
|
||||||
|
[submodule "reverse_engineering/java/deobfuscator"]
|
||||||
|
path = reverse_engineering/java/deobfuscator
|
||||||
|
url = https://github.com/java-deobfuscator/deobfuscator.git
|
||||||
|
|
|
@ -149,6 +149,7 @@ sqlmap -r request.txt --batch
|
||||||
```sh
|
```sh
|
||||||
sqlmap -u http://<target-IP>/site.php --forms --dump-all
|
sqlmap -u http://<target-IP>/site.php --forms --dump-all
|
||||||
```
|
```
|
||||||
|
* [Get reverse shell via sqlmap](https://www.hackingarticles.in/shell-uploading-in-web-server-using-sqlmap/)
|
||||||
|
|
||||||
|
|
||||||
|Parameter|Details|
|
|Parameter|Details|
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
# oletools & Vmonkey
|
||||||
|
|
||||||
|
* Analyze ooxml and ole2 files
|
||||||
|
|
||||||
|
* [oletools repo](https://github.com/decalage2/oletools.git)
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
* Check content of a stream
|
||||||
|
```sh
|
||||||
|
oledump.py file.doc -Ss <No. of stream>
|
||||||
|
oledump.py file.doc -Ss <No. of stream> -v
|
||||||
|
```
|
||||||
|
```sh
|
||||||
|
oledump.py -i file.doc
|
||||||
|
```
|
||||||
|
```sh
|
||||||
|
olevba file.doc
|
||||||
|
```
|
||||||
|
|
||||||
|
## Vipermonkey
|
||||||
|
* For the lazy ones
|
||||||
|
```sh
|
||||||
|
vmonkey file.doc
|
||||||
|
```
|
||||||
|
|
||||||
|
## scdbg
|
||||||
|
* [scdbg repo](https://github.com/dzzie/SCDBG.git)
|
|
@ -0,0 +1,40 @@
|
||||||
|
# Yara
|
||||||
|
|
||||||
|
## Structure
|
||||||
|
A rule consists of
|
||||||
|
* Name
|
||||||
|
* Metadata
|
||||||
|
* String definitions
|
||||||
|
* Conditions on these strings
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
```sh
|
||||||
|
rule eicar {
|
||||||
|
meta:
|
||||||
|
author="foo"
|
||||||
|
description="eicar test virus"
|
||||||
|
strings:
|
||||||
|
$a="X5O"
|
||||||
|
$b="EICAR"
|
||||||
|
$c="ANTIVIRUS"
|
||||||
|
$d="TEST"
|
||||||
|
condition:
|
||||||
|
$a and $b and $c and $d
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
* Information about a rule, metadata or strings
|
||||||
|
```sh
|
||||||
|
yara -m <file.yara> <file.target>
|
||||||
|
yara -s <file.yara> <file.target>
|
||||||
|
```
|
||||||
|
|
||||||
|
* Run Yara via
|
||||||
|
```sh
|
||||||
|
yara <file.yara> <file.target>
|
||||||
|
```
|
||||||
|
* If the name of the rule and the target is returned, the rule matched. Otherwise it did not match.
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
Subproject commit 95dcf1d6a6072c6110dd99311b49d7734d17ce5e
|
|
@ -0,0 +1,17 @@
|
||||||
|
# Krakatau
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
* Get bytecode from `jar` file
|
||||||
|
```sh
|
||||||
|
krakatau-disassemble -r file.jar -out dissassemble.zip
|
||||||
|
```
|
||||||
|
* Generate bytecode
|
||||||
|
```sh
|
||||||
|
krakatau-assemble -out result.jar -r dissassembled/
|
||||||
|
```
|
||||||
|
* Do changes to the bytecode
|
||||||
|
* Compile jar file
|
||||||
|
```sh
|
||||||
|
java -cp result.jar <fileNameOfMainClass>
|
||||||
|
```
|
||||||
|
|
Loading…
Reference in New Issue