MISC
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
In a ping response TTL: 127 = Windows 254 = Cisco Lo demás,algunlinux
$1$- md5 $2$or $2a$ - Blowfish $5$- sha256 $6$- sha512
If you do not know what is behind a service, try to make and HTTP GET request.
UDP Scans nc -nv -u -z -w 1 <IP> 160-16
An empty UDP packet is sent to a specific port. If the UDP port is open, no reply is sent back from the target machine. If the UDP port is closed, an ICMP port unreachable packet should be sent back from the target machine.\
UDP port scanning is often unreliable, as firewalls and routers may drop ICMP packets. This can lead to false positives in your scan, and you will regularly see UDP port scans showing all UDP ports open on a scanned machine. o Most port scanners do not scan all available ports, and usually have a preset list of “interesting ports” that are scanned.
In Windows use Winzip to search for files. Alternate data Streams: dir /r | find ":$DATA"\
featherduster\
25x25 = QR
factordb.com rsatool
Snow --> Hide messages using spaces and tabs
%E2%80%AE => RTL Character (writes payloads backwards)
Basae64(6—>8) —> 0...9, a...z, A…Z,+,/ Base32(5 —>8) —> A…Z, 2…7 Base85 (Ascii85, 7—>8) —> 0...9, a...z, A...Z, ., -, :, +, =, ^, !, /, *, ?, &, <, >, (, ), [, ], {, }, @, %, $, # Uuencode --> Start with "begin <mode> <filename>" and weird chars Xxencoding --> Start with "begin <mode> <filename>" and B64 Vigenere (frequency analysis) —> Scytale (offset of characters) —>
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.