|
2 years ago | |
---|---|---|
README.md | 2 years ago | |
natas13.jpg | 2 years ago | |
natas13.txt | 2 years ago |
Notes on wargames.
xxd
for binary files. Use -r
flag for reverse (hex to binary).base64
for base64 files. Use -d
flag for decode.alias rot13="tr '[A-Za-z]' '[N-ZA-Mn-za-m]'"
alias for rot13 substitution cipher.zcat
for expanding compressed files.ssh-keygen -e -f <file>
for generating a public/private key using a given public/private key.telnet
for connecting to local via TELNET protocol.openssl s_client -connect sitilge.id.lv
for connecting to a server.nmap -p 31000-32000 localhost --script ssl-enum-ciphers
for scanning ports 31000 to 32000 and checking if they speak SSL.ssh -T
for disabling pseudo-terminal allocation.nc
for arbitrary TCP and UDP connections and listens.nc
than calling nc
in each iteration.#!/bin/sh
for i in 0 1 2 3 4 5 6 7 8 9; do
for j in 0 1 2 3 4 5 6 7 8 9; do
for k in 0 1 2 3 4 5 6 7 8 9; do
for l in 0 1 2 3 4 5 6 7 8 9; do
combination=${i}${j}${k}${l}
echo "UoMYTrfrBFHyQXmg6gzctqAwOmw1IohZ ${combination}"
done
done
done
done
xxd
and ./Natas/natas13.*
to get more comfortable with hexdumps. Note: the first 4 bytes of natas13.jpg
are .jpg
file signatures.