You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: crypto.txt
+1
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,7 @@ Concepts
24
24
**DNSSEC** protocol to extend DNS with integrity checking. Each nameserver has associated keys for that zone. DANE is a bridge between DNSSEC and TLS authentication.
25
25
**Online Certificate Status Protocol (OCSP)** is an Internet protocol used for obtaining the revocation status of an X.509 digital certificates.
26
26
**Sidejacking** is a special case of web application session hijacking in which session tokens are retrieved from an unencrypted traffic stream.
27
+
**Key stretching** involves making a weak key stronger against bruteforce attacks by increasing the time it takes to test every key. Usually it is stretched by appling salts and macing the hash. algorithms are PBKDF2, bcrypt, and scrypt
27
28
28
29
Numbers generation
29
30
True Pseudo Random Number Generator (TPRNG): Uses entropy from multiple sources such as keyboard strikes to get a good seed.
Copy file name to clipboardexpand all lines: linuxeop.txt
+5-5
Original file line number
Diff line number
Diff line change
@@ -56,19 +56,19 @@ Linux elevation of privileges, manual testing
56
56
57
57
Look for vulnerable/privileged components such as: mysql, sudo, udev, python
58
58
59
-
If */etc/exports* if writable, you can add an NFS entry or change and existing entry adding the no_root_squash flag to a root directory, put a binary with SUID bit on, and get root.
60
-
If there is a *cronjob* that runs as run but it has incorrect file permissions, you can change it to run your SUID binary and get a shell.
59
+
If **/etc/exports** if writable, you can add an NFS entry or change and existing entry adding the **no_root_squash** flag to a root directory, put a binary with SUID bit on, and get root.
60
+
If there is a **cronjob** that runs as run but it has incorrect file permissions, you can change it to run your SUID binary and get a shell.
61
61
62
62
The following command will list processes running by root, permissions and NFS exports.
63
-
*$ echo 'services runnig as root'; ps aux | grep root; echo 'permissions'; ps aux | awk '{print $11}'|xargs -r ls -la 2>/dev/null |awk '!x[$0]++'; echo 'nfs info'; ls -la /etc/exports 2>/dev/null; cat /etc/exports 2>/dev/null*
63
+
*$ echo 'services running as root'; ps aux | grep root; echo 'permissions'; ps aux | awk '{print $11}'|xargs -r ls -la 2>/dev/null |awk '!x[$0]++'; echo 'nfs info'; ls -la /etc/exports 2>/dev/null; cat /etc/exports 2>/dev/null*
64
64
65
65
Use netstat to find other machines connected
66
66
*$ netstat -ano*
67
67
68
68
Command to skip ignored lines in config files
69
69
*$ alias nonempty="egrep -v '^[ \t]*#|^$'"*
70
70
71
-
If Mysql is running as root, you can run commands using *sys_exec()*. For instance, to add user to sudoers:
71
+
If Mysql is running as root, you can run commands using **sys_exec()**. For instance, to add user to sudoers:
0 commit comments