Skip to content

Commit b325de1

Browse files
committed
Fix highlighting
1 parent a9f3489 commit b325de1

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

crypto.txt

+1
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ Concepts
2424
**DNSSEC** protocol to extend DNS with integrity checking. Each nameserver has associated keys for that zone. DANE is a bridge between DNSSEC and TLS authentication.
2525
**Online Certificate Status Protocol (OCSP)** is an Internet protocol used for obtaining the revocation status of an X.509 digital certificates.
2626
**Sidejacking** is a special case of web application session hijacking in which session tokens are retrieved from an unencrypted traffic stream.
27+
**Key stretching** involves making a weak key stronger against bruteforce attacks by increasing the time it takes to test every key. Usually it is stretched by appling salts and macing the hash. algorithms are PBKDF2, bcrypt, and scrypt
2728

2829
Numbers generation
2930
True Pseudo Random Number Generator (TPRNG): Uses entropy from multiple sources such as keyboard strikes to get a good seed.

linuxeop.txt

+5-5
Original file line numberDiff line numberDiff line change
@@ -56,19 +56,19 @@ Linux elevation of privileges, manual testing
5656

5757
Look for vulnerable/privileged components such as: mysql, sudo, udev, python
5858

59-
If */etc/exports* if writable, you can add an NFS entry or change and existing entry adding the no_root_squash flag to a root directory, put a binary with SUID bit on, and get root.
60-
If there is a *cronjob* that runs as run but it has incorrect file permissions, you can change it to run your SUID binary and get a shell.
59+
If **/etc/exports** if writable, you can add an NFS entry or change and existing entry adding the **no_root_squash** flag to a root directory, put a binary with SUID bit on, and get root.
60+
If there is a **cronjob** that runs as run but it has incorrect file permissions, you can change it to run your SUID binary and get a shell.
6161

6262
The following command will list processes running by root, permissions and NFS exports.
63-
*$ echo 'services runnig as root'; ps aux | grep root; echo 'permissions'; ps aux | awk '{print $11}'|xargs -r ls -la 2>/dev/null |awk '!x[$0]++'; echo 'nfs info'; ls -la /etc/exports 2>/dev/null; cat /etc/exports 2>/dev/null*
63+
*$ echo 'services running as root'; ps aux | grep root; echo 'permissions'; ps aux | awk '{print $11}'|xargs -r ls -la 2>/dev/null |awk '!x[$0]++'; echo 'nfs info'; ls -la /etc/exports 2>/dev/null; cat /etc/exports 2>/dev/null*
6464

6565
Use netstat to find other machines connected
6666
*$ netstat -ano*
6767

6868
Command to skip ignored lines in config files
6969
*$ alias nonempty="egrep -v '^[ \t]*#|^$'"*
7070

71-
If Mysql is running as root, you can run commands using *sys_exec()*. For instance, to add user to sudoers:
71+
If Mysql is running as root, you can run commands using **sys_exec()**. For instance, to add user to sudoers:
7272
*sys_exec('usermod -a -G admin username')*
7373
More about mysql:
7474
*https://www.adampalmer.me/iodigitalsec/2013/08/13/mysql-root-to-system-root-with-udf-for-windows-and-linux/*
@@ -91,7 +91,7 @@ Linux elevation of privileges, manual testing
9191
Find writable configuration files
9292
*$ find /etc/ -writable -type f 2>/dev/null*
9393

94-
Missconfigured services
94+
Miss-configured services
9595
*$ cat /etc/syslog.conf; cat /etc/chttp.conf; cat /etc/lighttpd.conf; cat /etc/cups/cupsd.conf; cat /etc/inetd.conf; cat /etc/apache2/apache2.conf; cat /etc/my.conf; cat /etc/httpd/conf/httpd.conf; cat /opt/lampp/etc/httpd.conf; ls -aRl /etc/ | awk '$1 ~ /^.*r.*/*
9696

9797
Scheduled jobs

0 commit comments

Comments
 (0)