Jump to content
Hak5 Forums

jOte-

Active Members
  • Content count

    23
  • Joined

  • Last visited

1 Follower

About jOte-

  • Rank
    Hak5 Fan

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. jOte-

    Any RDP Cracker in the house?

    bruteforcing rdp is stupid... gpo would lock u out as PoSHMagiC0de is mentioning...
  2. jOte-

    Any RDP Cracker in the house?

    See spoiler:
  3. jOte-

    Any RDP Cracker in the house?

    :: "Unknown publisher" REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\LocalDevices" /v "%HOSTNAME%;%RDGATEWAY%" /t "REG_DWORD" /d 109 /f >NUL 2>&1 :: "The identity of the remote computer cannot be verified. Do you want to connect anyway?" REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client" /v "AuthenticationLevelOverride" /t "REG_DWORD" /d 0 /f >NUL 2>&1 :: Delete old credentials from Micro$oft vault CMD /Q /D /C cmdkey /delete:"%RDGATEWAY%" >NUL 2>&1 CMD /Q /D /C cmdkey /delete:"%HOSTNAME%" >NUL 2>&1 :: Store credentials to Micro$oft vault CMD /Q /D /C cmdkey /add:"%RDGATEWAY%" /user:"%RDUSERNAME%" /pass:"%RDPASSWORD%" >NUL 2>&1 CMD /Q /D /C cmdkey /generic:"%HOSTNAME%" /user:"%USERNAME%" /pass:"%PASSWORD%" >NUL 2>&1
  4. jOte-

    Microsoft acquiring Github

    Some few ppl are getting rich.... on selling data, ... they don't care.... (another villa in walhalla) ppl who made the Internet are Geniuses!! .. and then came the marketeer - seller ....and fucked it all up... the wrong thing about this ... i'm the creator.... but still... the marketeer/seller is driving the bigger car?
  5. I 'm just interested in doing stuff in different ways.... on the payroll scripts - if it run... ship it - or the script you make for yourself! the bad way .... or the good way
  6. jOte-

    Pi Zero w Bash Bunny

    maybe some stupid question .... but could you make the device to boot like virtual iso'z ....? Like the zalman device do?
  7. jOte-

    Pi Zero w Bash Bunny

    making my zero pi to my favorite usb-stick.... show me the distro.... 🙂
  8. jOte-

    Pi Zero w Bash Bunny

  9. jOte-

    Pi Zero w Bash Bunny

    I can start a museum over here according to PI... I was amazed at the first day!!! Pi as hotspot..., Pi tor gateway, pure testing device... playdevice
  10. jOte-

    WIndows information

    The question is... do you want it to be stealthy? or just as administrator... Its true Bashbunny and Rubberducky can be used as infiltration/information gathering devices.... But, also as a usefull tool to do repitive tasks as administrator - like installing xx new laptops - If you know what you are doing... you can do nice things with this device! I do agree with MB60893 ... If you want info, stealthy/or not, there are other solutions...
  11. PoSH, im interested in the memory stuff... you have some more info? can you point me to the right direction? tnx
  12. jOte-

    WIndows information

    Check the file "gatherNetworkInfo.vbs" in c:\windows\system32 😉
  13. interesting... i have to check that out! tnx
  14. i had that idea running into the winscp scripting question... // 2>NUL||@GOTO :BATCH /* :BATCH @ECHO OFF MODE CON: COLS=120 LINES=20 BUFFER=100 COLOR 08 SET CSC= FOR /F "TOKENS=1,2 DELIMS=#" %%a IN ('"PROMPT #$H#$E# & ECHO ON & FOR %%b IN (1) DO REM"') DO ( SET "DEL=%%a" ) CLS ECHO. CALL :H "-- REQUIREMENTS -----------------------------------------------------------------------------------" FOR /R "%SystemRoot%\Microsoft.NET\Framework\" %%# IN ("*csc.exe") DO SET "CSC=%%#" IF NOT DEFINED CSC ( CALL :CE " [!] no .net framework or csc.exe found!" EXIT /B 10 ) ELSE ( CALL :I " [i] csc.exe found" ) CALL :H "-- COMPILING --------------------------------------------------------------------------------------" CALL :NCE " [-] Delete old executable file if exists." DEL /Q /F "%~n0.exe" >NUL 2>NUL IF NOT EXIST "%~n0.exe" ( CALL :OK " [+] Creating new executable file." ECHO. CALL %CSC% /nologo /reference:"WinSCPnet.dll" /warn:0 /out:"%~n0.exe" "%~dpsfnx0" || ( ECHO. CALL :WTF " [!] Creating executable file FAILED!" EXIT /B %errorlevel% ) ) CALL :I " [i] Start running executable file." CALL :H "-- START ----------------------------------------------------------------------------------------" ECHO. %~n0.exe %* ECHO. CALL :H "-- END ------------------------------------------------------------------------------------------" ECHO. CALL :I " [i] End running executable file." TIMEOUT 10 > NUL 2>&1 ENDLOCAL & EXIT /B %errorlevel% :COLORTEXT :: COLOR [attr] :: attr Specifies color attribute of console output :: Color attributes are specified by TWO hex digits — the first corresponds to the background; the second the foreground. :: Each digit can be any of the following values: :: 0 = Black 8 = Gray :: 1 = Blue 9 = Light Blue :: 2 = Green A = Light Green :: 3 = Aqua B = Light Aqua :: 4 = Red C = Light Red :: 5 = Purple D = Light Purple :: 6 = Yellow E = Light Yellow :: 7 = White F = Bright White ECHO OFF <NUL SET /p ".=%DEL%" > "%~2" FINDSTR /v /a:%1 /R "^$" "%~2" NUL DEL "%~2" > NUL 2>&1 & ECHO. GOTO :EOF :I :INFO CALL :COLORTEXT 09 %1 GOTO :EOF :H :HEADER ECHO. CALL :COLORTEXT 0F %1 ECHO. GOTO :EOF :C :CREATE :OK CALL :COLORTEXT 02 %1 GOTO :EOF :NCE :NONCRITICALERR CALL :COLORTEXT 0D %1 GOTO :EOF :CE :WTF :CRITICALERR CALL :COLORTEXT 04 %1 ECHO. TIMEOUT 20 EXIT /B %errorlevel% GOTO :EOF */ using System; using WinSCP; class ftw { public static int Main() { try { SessionOptions sessionOptions = new SessionOptions { Protocol = Protocol.Sftp, HostName = "192.168.*.*", PortNumber = 22, UserName = "***********************", Password = "********", SshHostKeyFingerprint = "ssh-****** 512 **:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**" }; using (Session session = new Session()){ session.FileTransferred += FileTransferred; session.Open(sessionOptions); SynchronizationResult synchronizationResult; synchronizationResult = session.SynchronizeDirectories(SynchronizationMode.Remote, @"C:\Users\unkown\Pictures\","/home/lnxuser/Pictures/", false); synchronizationResult.Check(); CommandExecutionResult commandResult; commandResult = session.ExecuteCommand("/home/lnxyser/Pictures/resize.sh"); commandResult.Check(); Console.WriteLine(commandResult.Output); } return 0; } catch (Exception e) { Console.WriteLine("Error: {0}", e); return 1; } } private static void FileTransferred(object sender, TransferEventArgs e) { if (e.Error == null) { Console.WriteLine("Upload of {0} succeeded", e.FileName); } else { Console.WriteLine("Upload of {0} failed: {1}", e.FileName, e.Error); } if (e.Chmod != null) { if (e.Chmod.Error == null) { Console.WriteLine("Permissions of {0} set to {1}", e.Chmod.FileName, e.Chmod.FilePermissions); } else { Console.WriteLine("Setting permissions of {0} failed: {1}", e.Chmod.FileName, e.Chmod.Error); } } else { Console.WriteLine("Permissions of {0} kept with their defaults", e.Destination); } if (e.Touch != null) { if (e.Touch.Error == null) { Console.WriteLine("Timestamp of {0} set to {1}", e.Touch.FileName, e.Touch.LastWriteTime); } else { Console.WriteLine("Setting timestamp of {0} failed: {1}", e.Touch.FileName, e.Touch.Error); } } else { Console.WriteLine("Timestamp of {0} kept with its default (current time)", e.Destination); } } }
  15. // 2>NUL||@GOTO :BATCH /* :BATCH @ECHO OFF MODE CON: COLS=120 LINES=20 BUFFER=100 COLOR 08 SET CSC= FOR /F "TOKENS=1,2 DELIMS=#" %%a IN ('"PROMPT #$H#$E# & ECHO ON & FOR %%b IN (1) DO REM"') DO ( SET "DEL=%%a" ) CLS ECHO. CALL :H "-- REQUIREMENTS -----------------------------------------------------------------------------------" FOR /R "%SystemRoot%\Microsoft.NET\Framework\" %%# IN ("*csc.exe") DO SET "CSC=%%#" IF NOT DEFINED CSC ( CALL :CE " [!] no .net framework or csc.exe found!" EXIT /B 10 ) ELSE ( CALL :I " csc.exe found" ) CALL :H "-- COMPILING --------------------------------------------------------------------------------------" CALL :NCE " [-] Delete old executable file if exists." DEL /Q /F "%~n0.exe" >NUL 2>NUL IF NOT EXIST "%~n0.exe" ( CALL :C " [+] Creating new executable file." ECHO. CALL %CSC% /nologo /reference:"" /warn:0 /out:"%~n0.exe" "%~dpsfnx0" || ( ECHO. CALL :CE " [!] Creating executable file FAILED!" EXIT /B %errorlevel% ) ) CALL :I " Start running executable file." CALL :H "-- START ----------------------------------------------------------------------------------------" ECHO. %~n0.exe %* ECHO. CALL :H "-- END ------------------------------------------------------------------------------------------" ECHO. CALL :I " End running executable file." TIMEOUT 10 > NUL 2>&1 ENDLOCAL & EXIT /B %errorlevel% :COLORTEXT ECHO OFF <NUL SET /p ".=%DEL%" > "%~2" FINDSTR /v /a:%1 /R "^$" "%~2" NUL DEL "%~2" > NUL 2>&1 & ECHO. GOTO :EOF :I :INFO CALL :COLORTEXT 09 %1 GOTO :EOF :H :HEADER ECHO. CALL :COLORTEXT 0F %1 ECHO. GOTO :EOF :C :CREATE CALL :COLORTEXT 02 %1 GOTO :EOF :NCE :NONCRITICALERR CALL :COLORTEXT 0D %1 GOTO :EOF :CE :CRITICALERR CALL :COLORTEXT 04 %1 ECHO. TIMEOUT 30 EXIT /B %errorlevel% GOTO :EOF REM C# CODE AFTER THIS... REM */ using System; class ftw { public static void Main() { try { Console.WriteLine(System.Diagnostics.Process.GetCurrentProcess().MainModule.FileName + "\n"); Console.WriteLine("--- you asked 4me?"); Console.WriteLine("----- Compile your code on target machine..."); Console.WriteLine("--- Most of the time Antivirus will allow that..."); } catch (Exception e) { Console.WriteLine("Error: {0}", e); } } }
×