Nov 25, 2014

CheatSheet: Windows Incident Response Cheat Sheet


Source:: https://twitter.com/Securityartwork/status/536905910145544193/photo/1


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Howto: get real ip behind CloudFlare

1) Use a Resolver

 
2) Enter URL of your target site here:

3) Click Search

4) This is the plain IP
 
OR
IpLogger is a website which allows you to see traffic on imag files. 

This is a very useful method and can help you get the IP of  practically anyone if you know what to do.
1) Go to http://iplogger.org/getnewid.php and copy the 3rd link in the boxes.
2) Go to any forum where you can change your avatar. Let us use hackforums.net for this example
3) Paste the image url your retrieved from IPLogger earlier and click on change avatar. This will prompt a SQL error because the image file is way too small. Do not worry though, everything worked well. Right before the error, MaDLeeTs.CoM pinged the image and that's all we need!
4) Now, go back to IPLogger and click "View Log." button. This will forward
you to a statistics page where we can find the real IP address
 


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Tools: LinEnum - Linux Enumeration Tool

For more information visit www.rebootuser.com
Note: Export functionality is currently in the experimental stage.
General usage:
version 0.5
  • Example: ./LinEnum.sh -k keyword -r report -e /tmp/ -t
OPTIONS:
  • -k Enter keyword
  • -e Enter export location
  • -t Include thorough (lengthy) tests
  • -r Enter report name
  • -h Displays this help text
Running with no options = limited scans/no output file
  • -e Requires the user enters an output location i.e. /tmp/export. If this location does not exist, it will be created.
  • -r Requires the user to enter a report name. The report (.txt file) will be saved to the current working directory.
  • -t Performs thorough (slow) tests. Without this switch default 'quick' scans are performed.
  • -k An optional switch for which the user can search for a single keyword within many files (documented below).
See CHANGELOG.md for further details
High-level summary of the checks/tasks performed by LinEnum:
  • Kernel and distribution release details
  • System Information:
    • Hostname
    • Networking details:
    • Current IP
    • Default route details
    • DNS server information
  • User Information:
    • Current user details
    • Last logged on users
    • List all users including uid/gid information
    • List root accounts
    • Extracts password policies and hash storage method information
    • Checks umask value
    • Checks if password hashes are stored in /etc/passwd
    • Extract full details for ‘default’ uid’s such as 0, 1000, 1001 etc
    • Attempt to read restricted files i.e. /etc/shadow
    • List current users history files (i.e .bash_history, .nano_history etc.)
    • Basic SSH checks
  • Privileged access:
    • Determine if /etc/sudoers is accessible
    • Determine if the current user has Sudo access without a password
    • Are known ‘good’ breakout binaries available via Sudo (i.e. nmap, vim etc.)
    • Is root’s home directory accessible
    • List permissions for /home/
  • Environmental:
    • Display current $PATH
  • Jobs/Tasks:
    • List all cron jobs
    • Locate all world-writable cron jobs
    • Locate cron jobs owned by other users of the system
  • Services:
    • List network connections (TCP & UDP)
    • List running processes
    • Lookup and list process binaries and associated permissions
    • List inetd.conf/xined.conf contents and associated binary file permissions
    • List init.d binary permissions
  • Version Information (of the following):
    • Sudo
    • MYSQL
    • Postgres
    • Apache
    • Checks user config
  • Default/Weak Credentials:
    • Checks for default/weak Postgres accounts
    • Checks for default/weak MYSQL accounts
  • Searches:
    • Locate all SUID/GUID files
    • Locate all world-writable SUID/GUID files
    • Locate all SUID/GUID files owned by root
    • Locate ‘interesting’ SUID/GUID files (i.e. nmap, vim etc)
    • List all world-writable files
    • Find/list all accessible *.plan files and display contents
    • Find/list all accessible *.rhosts files and display contents
    • Show NFS server details
    • Locate *.conf and *.log files containing keyword supplied at script runtime
    • List all *.conf files located in /etc
    • Locate mail

 Source:: https://github.com/rebootuser/LinEnum

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.