This is a walkthrough of the Wallaby’s: Nightmare VM from VulnHub (https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/) First, I needed to locate the box. This was pretty simply since my subnet is setup for DHCP on the 192.168.56.0/24 range. I added the target VMs ip
Note: For both of these programs, even though they tunnel out shells, each time you run a command its started in a new shell. This has the side-effect of the “cd” command not working. I might fix this later by
Update: Tested it under Windows 7, Cygwin, openSUSE, and Ubuntu 16 on Python 2.6 and Python 2.7. Works on all these platforms, but you cannot syn-scan from windows/cygwin This is a scanner written in Python 2.X I am almost positive
Below is a script to survey Unix systems. This should work on most flavors of *nix systems.
Here’s a fun program that persistently backdoors a system. Must run as root if you want the listener to be persistent. Of course it can be modified to use a normal user. Utilizes a file lock to ensure only one
Two examples of how to implement threading in a Python application. Goes over Pool and Pool().map in one example, and Thread and Queue in the second example.
So my other post got you into Arch linux. That’s awesome, except all you have is a giant tty screen. Lets get a gui on it. This walkthrough will setup Fluxbox as your window manager (WM), no desktop environment. This
So I decided I wanted to try my hand at an Arch linux install. I just finished up and it mostly worked. I skipped networking though so I will have to fix that later. Heres the walkthrough for my own
This is piecemeal, I just wanted to put my thoughts down. First off: root pts/3 ip.c Thu Jan 21 20:32 – 20:35 (00:03) root pts/3 ip.c Thu Jan 21 20:31 – 20:31 (00:00) root pts/3 ip.c Thu Jan 21 00:04
Here is a script I wrote up to hide data inside of existing image files. Currently, it only modifies the RED value of RGB values, and works off of detecting even/odd for one and zero.