All in one big bag. For fun, profits, or CTFs.
grep word f1
sort | uniq -c
diff f1 f2
find -size f1
zcat f1 > f2
gzip -d file
bzip2 -d f1
tar -xvf file
echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
openssl s_client -connect localhost:30001 -quiet
nmap -p 31000-32000 localhost
telnet localhost 3000
-
In Python:
-
Decimal to binary
>>> bin(124234)
'0b11110010101001010'
- Decimal to hex:
>>> s =hex(secret)
- Hexadecimal to binary:
SECRET.decode('hex')
'==QcCtmMml1ViV3b'
$ python -c 'print "2f722f6e6574736563".decode("hex")'
- Hex to ascii:
$ xxd -r -p <<< 2f722f6e6574736563
- Base64 decode:
>>> SECRET.decode('base64')
'oubWYf2kBq'
The recon problems usually give you someone/something's name and a task or a hint to find some specific information about it. So the first thing is of course google it.
Google anything using keywords such as filetype:cgi inurl:cgi-bin
- Facebook, Twitter, Linkedin, Google+, reddit, /r/netsec.
- IRC: with **/whois **.
- namechk
- Github: check in the commit history.