Search the Community
Showing results for tags 'decrypt'.
-
Hello everyone! I was hoping someone could possibly help with an issue I am running into. I am using the Packet Squirrel to do a collect info for a printer on my network, however, something else that I would like to incorporate is an SSLKEYLOGFILE environment variable. Is it possible to create this variable via a Packet Squirrel collect? Or could I possibly write a script to create the environment variable from the Packet Squirrel collect? Thanks much in advance for any advice!
-
EncDecFiles.ps1 Author: (c) 2017 by QDBA Version 1.0 Description EncDecFiles.ps1 is a powershell script to Encrypt / Decrypt a powershell (or any other) file with AES. You can use it to obfuscate your powershell script, so AV Scanner doesn't detect it. Usage: EncDecFiles.ps1 < -Encrypt | -Decrypt > # encrypt or decrypt a file < -In Filename > # Input File [ -Out Filename ] # Output File [ -Pass Password ]
-
Salutations Hak5, I'm S0AndS0 a long time watcher (and big fan) of the various shows that have been made available by the Hak5 teem. What is shared here maybe thought of as a "tricky treat" for the holiday. https://github.com/S0AndS0/Perinoid_Pipes The above project has been documented in detail (because we've heard that the show hosts of Hak5 like that out of project authors) and as of latest local & remote tests is operating as expected. Simply put this project facilitates common encryption & decryption options of GnuPG via a named pipe (similar to an
-
Hi, did someone know how i could decrypt a BLOB-Data from the Windows Registry? For Example there is a digital certificate stored which looks like it is encrypted. Now i want to decrypt it with java and native call the crypt32.dll (function: cryptUnprotectData()) with JNA. i tried it, but i get data invalid error. the function could have many arguments, but i did not found out which i have to use exactly. here is my little peace of code - maybe it helps.. byte[] byteArray = (byte[]) Advapi32Util.registryGetValue(WinReg.HKEY_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\SystemCertificates\\AuthRoot
-
Hey, I got a TKIP Shared key but its encrypted so it looks like this : 01000000D08C9DDF0115D1118C7A00C04FC297EB01000000AB0755C8A2892F47A7C0032ADE095A320000000002000000000010660000000100002000000082DCC8201C2332E711B161AEA724C1823E62BD26843D4FBF4D53177C28F85384000000000E80000000020000200000003B263D71C9A1773CD4607C19949D3273DF5F15F9BD82FF655C5869B5E7FAA222200000004AECBD9F55861394941FEB35CA8C12E552E2307CEC8535F0CE8243A9190BD17F400000005A05F984231ACDCB7ED3251E4BCB3E51190E63B139CDB10FB7479F544E9C48426D50613C19F8DBC910C5A7254644353598365A4F372CA0774839EF6B17706EAE Is there a way to decrypt this? i
-
Greetings! I'm having a problem with a Hex-code Password from a registry file. Its related with Bearshare. I fed in a hex to ASCII converter, and this string pops out: Ð Ñ O eMž í» EncryptedString ü ©c \ °·Ûv â Ë ¥ ³ M3æ ¥Ç" ïr©ÜVâ5à $l Ž Lol, any help would be greatly appreciated. Thanks! > Registry Contents below: "Password"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,01,\ 00,00,00,90,ae,9f,9f,65,be,4d,48,9e,ae,18,17,ed,13,bb,75,00,00,00,00,20,00,\ 00,00,45,00,6e,00,63,00,72,00,79,00,70,00,74,00,65,00,64,00,53,00,74,00,72,\ 00,69,00,6e,00,67,00,00,00,