$ bcdedit /set hypervisorlaunchtype off
- VMWare Workstation
- solution for an install trouble on Linux Host
- manual compile
vmmon.ko
andvmnet.ko
$ sudo apt install gcc ## If you need install a specific version, input this. ## sudo apt install gcc-12 $ $ sudo apt install make $ $ cd ~/ # # choose an apropriate branch that suits your vmware version. $ git clone --branch workstation-17.5.0 https://github.com/mkubecek/vmware-host-modules.git $ $ cd ~/vmware-host-modules/ $ $ cd ~/vmware-host-modules/vmmon-only/ $ make $ $ cd ~/vmware-host-modules/vmnet-only/ $ make $ $ cd ~/vmware-host-modules/ $ sudo make install
- vs. Secure Boot
On UEFI console
$ cd ~/ $ openssl req -new -x509 -newkey rsa:2048 -keyout MOK.priv -outform DER -out MOK.der -nodes -days 36500 -subj "/CN=VMware/" $ $ sudo /usr/src/linux-headers-`uname -r`/scripts/sign-file sha256 ./MOK.priv ./MOK.der $(modinfo -n vmmon) $ $ sudo /usr/src/linux-headers-`uname -r`/scripts/sign-file sha256 ./MOK.priv ./MOK.der $(modinfo -n vmnet) $ $ sudo mokutil --password input password: input password again: $ $ sudo su # mokutil --import MOK.der input password: input password again: $ $ reboot
Press Enter Key: (Enter) Enroll MOK Continue Yes (input password) Reboot
- extend swap space
# e.g. allocate 24G as swap space $ $ sudo swapoff /swapfile $ sudo rm /swapfile $ sudo fallocate -l 24G /swapfile $ sudo chmod 600 /swapfile $ sudo mkswap /swapfile $ sudo swapon /swapfile
- manual compile
- disable Super Key
To enable Windows Key in VM, disable Super Key that is on Windows Key on Host Machine- install GNOME Tweaks from Software Center
- change Super Key that is on Windows Key to another key
- change Super Key + v into another key
- solution for an install trouble on Linux Host
system sound off due to noisy at click tab many times.
- 7zip
- Process Hacker
- Wireshark
- Geo IP Database for Wireshark
https://wiki.wireshark.org/HowToUseGeoIP#:~:text=MaxMind%20produces%20databases%20and%20software,information%20for%20an%20IP%20address. - うさみみハリケーン
- BurpSuite
- Firefox set CA and FoxyProxy for BurpSuite
- VSCode
- extensions
- zenkaku
- Highlight Trailing White Spaces
- WSL
- python
- vim
- jupyter
- extensions
- Tablacus Explorer
- Add-on
- split
- split 3
- split 6
- Dark Mode
- Add-on
- Exeinfo PE
- Office
- Word
- Excel
- PowerPoint
- Outlook
- OneNote
- Teams
- CMD Watcher
- OpenVPN
- Sysinternals Suite
- https://learn.microsoft.com/ja-jp/sysinternals/downloads/sysinternals-suite
- set PATH
- initial access
- Explorer Suite
https://ntcore.com/?page_id=388 - Hex Workshop
- VisualStudio
- ILSpy
https://github.com/icsharpcode/ILSpy/releases - dnSpy
https://github.com/dnSpy/dnSpy - x32/64dbg
https://x64dbg.com/- plugins
- OllyDumpEx
https://low-priority.appspot.com/ollydumpex/
put plugin file in plugin folder- release\x64\plugins\OllyDumpEx_X64Dbg.dp64
- release\x32\plugins\OllyDumpEx_X64Dbg.dp32
- ScyllaHide
https://github.com/x64dbg/ScyllaHide/releases - xAnalyzer
https://github.com/ThunderCls/xAnalyzer/releases/
- OllyDumpEx
- plugins
- Graphviz
this is for ProcDOT
https://graphviz.org/download/ - WinDump
this is for ProcDOT
https://www.winpcap.org/windump - ProcDOT
follow instructions in readme file
https://www.procdot.com/downloadprocdotbinaries.htm - API Monitor
https://www.rohitab.com/apimonitor - runsc
set PATH
https://github.com/edygert/runsc - scdbg
set PATH
https://sandsprite.com/blogs/index.php?uid=7&pid=152 - Python set PATH for Noriben
- Noriben
https://github.com/Rurik/Noriben- copy Procmon64.exe as procmon.exe to Noriben folder
- create bat file for my convenience
- noriben.bat
:: for output Noriben log to Desktop cd /d %userprofile%\Desktop :: run Noriben as Admin powershell -Command "Start-Process -Verb RunAs -FilePat 'C:\Users\user\AppData\Local\Programs\Python\Python311\python.exe' -ArgumentList 'C:\App\Noriben-2.0\Noriben.py'" pause
- CyberChef (local)
- FTK Imager
- Ghidra
- icon
https://github.com/NationalSecurityAgency/ghidra/blob/master/Ghidra/RuntimeScripts/Windows/support/ghidra.ico - extensions
- Ghidrathon
https://github.com/mandiant/Ghidrathon$ java -vesion $ where java # 1. set $JAVA_HOME $ python -m pip install numpy # 2. install Visual C++ Build Tools # 3. restart $ python -m pip install -r requirements.txt $ python ghidrathon_configure.py <absolute_path_to_ghidra_install_dir> # 4. set Ghidrathon .zip to <absolute_path_to_ghidra_install_dir>\Ghidra\Extensions\ # 5. manual configure on UI ## https://github.com/mandiant/Ghidrathon/issues/93 ## UI > File > Configure > Ghidra Core > Configure > GhidrathonPlugin ... CHECK -> ON
- Ghidrathon
- icon
- DCode
ListenPort: 9999
ListenAddress(external server can access) : XXX.XXX.XXX.XXX
ListenAddress(WSL machine IP) : YYY.YYY.YYY.YYY
$ $ListenPort_1=9999
$ $ListenPort_2=9999
$ $External_IP="XXX.XXX.XXX.XXX"
$ $WSL_IP="YYY.YYY.YYY.YYY"
# check
$ netsh interface portproxy show v4tov4
$ Get-NetFirewallRule -DisplayName "WSL2 Port Bridge"
#
# set
$ netsh interface portproxy add v4tov4 listenport=$ListenPort_1 listenaddress=$External_IP connectport=$ListenPort_1 connectaddress=$WSL_IP
$ New-NetFirewallRule -DisplayName "WSL2 Port Bridge" -Direction Inbound -Action Allow -Protocol TCP -LocalPort $ListenPort_1
## or
$ New-NetFirewallRule -DisplayName "WSL2 Port Bridge" -Direction Inbound -Action Allow -Protocol TCP -LocalPort $ListenPort_1,$ListenPort_2
#
# reset
$ netsh interface portproxy delete v4tov4 listenport=$ListenPort_1 listenaddress=$External_IP
$ Remove-NetFirewallRule -DisplayName "WSL2 Port Bridge"
#
# check
$ netsh interface portproxy show v4tov4
$ Get-NetFirewallRule -DisplayName "WSL2 Port Bridge"
on wsl
$ nc -lvnp 9999
$ Get-ExecutionPolicy -List
$ Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser -Force
$ Set-ExecutionPolicy -ExecutionPolicy Restricted -Scope CurrentUser
- Becasuse of a time difference between host and guset machine on WSL.
So, 'WSL restart' will be needed.
But sometimes, a time of host machine VM will be off.
Then you must update host machine's one.
// At Host Machine
$ wsl --shutdown
$ wsl
# my setting
# setxkbmap -layout jp
eval $(dircolors -b ~/.dircolors)
alias ll='ls -l'
alias la='ls -la'
alias grep='grep --color'
alias win='cd /mnt/c/Users/user'
alias lin='cd ~/'
alias ..='cd ..'
alias clip='/mnt/c/WINDOWS/system32/clip.exe'
alias pa2='source /home/user/virtual_py2.7/bin/activate'
alias pa2v='source /home/user/virtual_py2.7_ViperMonkey/bin/activate'
alias pa3='source /home/user/virtual_py3.10/bin/activate'
alias pa3j='source /home/user/virtual_py3.10_jupyterlab/bin/activate'
alias pa3a='source /home/user/virtual_py3.10_angr/bin/activate'
alias pd='deactivate'
alias vol2='sudo ~/virtual_py2/bin/python2.7 ~/volatility/vol.py'
alias vol3='sudo ~/virtual_py3/bin/python3.10 ~/volatility3/vol.py'
alias volshell3='sudo ~/virtual_py3/bin/python3 ~/volatility3/volshell.py'
alias a='uname -a'
alias elasticsearch='/home/user/arkime/elasticsearch-8.6.2/bin/elasticsearch'
alias arkimeviewer='cd /opt/arkime/viewer && /opt/arkime/bin/node /opt/arkime/viewer/viewer.js'
alias whatweb='/home/user/whatweb/WhatWeb-0.5.5/whatweb'
alias checksec='/home/user/checksec/slimm609-checksec.sh-7694735/checksec'
alias floss='/home/user/floss/quantumstrand'
alias gb='git branch'
alias gs='git switch'
alias ctf='cd /mnt/c/Users/user/CTF/picoCTF2021/Binary_Exploitation/Stonks'
export PATH=$PATH:/home/user/DidierStevensTool/oledump
export PATH=$PATH:/home/user/DidierStevensTool/pdf-parser
export PATH=$PATH:/home/user/DidierStevensTool/pdfid
export PATH=$PATH:/home/user/DidierStevensTool/js-1.7.0-mod-c/Windows
export PATH=$PATH:/home/user/DidierStevensTool/zipdump
export PATH=$PATH:/home/user/DidierStevensTool/base64dump
export PATH=$PATH:/home/user/DidierStevensTool/xmldump
export PATH=$PATH:/home/user/DidierStevensTool/msoffcrypto-crack
export PATH=$PATH:/home/user/RegRipper3.0
export PATH=$PATH:/home/user/anaconda3/bin
export PATH=$PATH:/home/user/peepdf
export PATH=$PATH:/home/user/pdfobjflow
export PATH=$PATH:/home/user/gobuster
export PATH=$PATH:/home/user/pwninit
export PATH=$PATH:/home/user/patchelf/bin
precmd_functions=""
export PS1='%F{042}┌ ─ ─ (%f%F{014}%n@%M%f%F{042})─ [%f%F{222}%d%f%F{042}]%f
%F{042}└ ─ %f %F{014}$%f '
xrdb ~/.Xresources
##
## improve zsh
### load git-prompt
source ~/.zsh/git-prompt.sh
### laod git-completion
fpath=(~/.zsh $fpath)
zstyle ':completion:*:*:git:*' script ~/.zsh/git-completion.bash
autoload -Uz compinit && compinit
# for show others
# export PS1=' %F{014}$%f '
the way to put depends on the color sheme.
~/.vim/colors
(put here iceberg.vim which is downloaded by Internet)
inoremap <silent> jj <ESC>
set relativenumber
# depends on a installed color scheme
syntax on
set background=dark
colorscheme everforest
caution: systemd=true conflicts with code(VSCode) on WSL
[boot]
systemd=true
- ~/.Xresources
UXterm is used when you use gdb in pwntools.UXTerm*utf8 : 1 UXTerm*locale : true UXTerm*selectToClipboard : true UXTerm*faceName : Dejavu Sans Mono:style=book UXTerm*faceNameDoublesize : Takao Pゴシック,TakaoPGothic:style=Regular UXTerm*faceSize : 15 UXTerm*background : black UXTerm*foreground : white UXTerm*saveLines : 2000 UXTerm*geometry : 100x50+100+100
$ xrdb ~/.Xresources
setting.json
- User setting
{ "files.autoSave": "afterDelay", "window.zoomLevel": -1, "vim.insertModeKeyBindings": [ { "before": [ "j", "j" ], "after": [ "<Esc>" ] } ], "vim.useSystemClipboard": true }
- WSL setting
{ "python.analysis.extraPaths": [ "/home/user/virtual_py3.10/lib/python3.10/site-packages" ], "python.autoComplete.extraPaths": [ "/home/user/virtual_py3.10/lib/python3.10/site-packages" ], "editor.snippetSuggestions": "top", "editor.suggest.showKeywords": false, "[python]": { "editor.wordBasedSuggestions": true }, "python.languageServer": "Pylance", "python.analysis.completeFunctionParens": true }
.vscode/launch.json
{ // Use IntelliSense to learn about possible attributes. // Hover to view descriptions of existing attributes. // For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387 "version": "0.2.0", "configurations": [ { "name": "Python: Current File !!!", "type": "python", "request": "launch", "program": "${file}", "console": "integratedTerminal", "justMyCode": true, "env": { "PYTHONPATH": "/home/user/virtual_py3.10/lib/python3.10/site-packages" } } ] }
$ sudo apt install zsh
$ chsh -s $(which zsh)
$ sudo apt install john
$ sudo apt install binwalk
$ sudo apt install foremost
$ sudo apt install exiftool
$ sudo apt install qpdf
$ sudo apt install cpanminus # for RegRipper
$ sudo apt install tshark
$ sudo apt install whois
$ sudo apt install ngrep
$ sudo apt install nmap -y
$ sudo apt install smbclient -y
$ sudo apt install dirb -y
$ sudo apt install jq
$ sudo apt install ltrace
$ sudo apt install clamav clamav-daemon
$ sudo freshclam
$ sudo apt install ffuf -y
$ sudo apt install default-jdk -y
$ cd ~/
$ git clone https://github.com/jesparza/peepdf.git
$ git clone https://github.com/keydet89/RegRipper3.0.git
$ git clone https://github.com/volatilityfoundation/volatility.git
$ git clone https://github.com/volatilityfoundation/volatility3.git
$ mkdir -p /home/user/DidierStevensTool/oledump
$ mkdir -p /home/user/DidierStevensTool/pdf-parser
$ mkdir -p /home/user/DidierStevensTool/pdfid
$ mkdir -p /home/user/DidierStevensTool/zipdump
$ mkdir -p /home/user/DidierStevensTool/base64dump
$ mkdir -p /home/user/DidierStevensTool/xmldump
##
## ----- completion for git at zsh ------
### https://qiita.com/mikan3rd/items/d41a8ca26523f950ea9d
$ mkdir ~/.zsh
$ cd ~/.zsh
$
$ curl -o git-prompt.sh https://raw.githubusercontent.com/git/git/master/contrib/completion/git-prompt.sh
$ curl -o git-completion.bash https://raw.githubusercontent.com/git/git/master/contrib/completion/git-completion.bash
$ curl -o _git https://raw.githubusercontent.com/git/git/master/contrib/completion/git-completion.zsh
##
## --------------------------------------
##
## ----- python ------
## - For use Python2 and Python3, virtualenv is installed.
##
$ sudo apt install python3.10
$ sudo apt install python2.7
$ sudo apt install python3-virtualenv
$ sudo apt install python2-pip-whl
$ sudo apt install python2-setuptools-whl
$ cd ~/
$ mkdir /home/user/virtual_py3.10
$ mkdir /home/user/virtual_py3.10_jupyterlab
$ mkdir /home/user/virtual_py3.10_angr
$ mkdir /home/user/virtual_py2.7
$ mkdir /home/user/virtual_py2.7_ViperMonkey
$ virtualenv -p python3.10 virtual_py3.10
$ virtualenv -p python3.10 virtual_py3.10_jupyterlab
$ virtualenv -p python3.10 virtual_py3.10_angr
$ virtualenv -p python2.7 virtual_py2.7
$ virtualenv -p python2.7 virtual_py2.7_ViperMonkey
## -------------------
##
##
## --- volatility3 ---
$ cd ~/
$ git clone https://github.com/volatilityfoundation/volatility3.git
##
## - test
##
$ pa3
$ vol3 -h
$
$ pip install pycrypto
$ pip install pefile
$ pip install yara-python
## -------------------
##
##
## --- volatility2 ---
$ cd ~/
$ git clone https://github.com/volatilityfoundation/volatility.git
##
## - test
##
$ pa2
$ vol2 -h
##
## - load necessary modules with pip
##
$ pip install pycryptodome
$ pip2 install distorm3==3.3.4
##
## - If you failed to install distorm with pip, you have to manually load necessary modules.
## -- distorm3 is deleted pip repo so need to install manually. Then high version of distrom3 does not suit to volatility2.
## --- $ cd ~/virtual_py2.7/lib/python2.7/site-packages/
## --- $ wget https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/distorm3/3.4.1-5/distorm3_3.4.1.orig.tar.gz
## --- $ tar -zxvf distorm3_3.4.1.orig.tar.gz
## --- $ rm distorm3_3.4.1.orig.tar.gz
## -------------------
##
## ------ Didier Stevens Tools -------------
### ---- oledump ----
$ cd /home/user/DidierStevensTool/oledump
$ wget https://didierstevens.com/files/software/oledump_V0_0_71.zip
$ unzip oledump_V0_0_71.zip
$ chmod +x oledump.py
$ chmod +x plugin_biff.py
$ pa3
###
### - test
###
$ oledump.py -h
$
$ pip install olefile
$
$ oledump.py -h
### ------------------
### ---- zipdump ----
$ mkdir /home/user/DidierStevensTool/zipdump
$ cd /home/user/DidierStevensTool/zipdump
$ wget https://didierstevens.com/files/software/zipdump_v0_0_25.zip
$ unzip ./zipdump_v0_0_25.zip
$ rm ./zipdump_v0_0_25.zip
$ chmod +x zipdump.py
$ pa3
###
### - test
###
$ zipdump.py -h
### ------------------
### ---- base64dump ----
$ mkdir /home/user/DidierStevensTool/base64dump
$ cd /home/user/DidierStevensTool/base64dump
$ wget https://didierstevens.com/files/software/base64dump_V0_0_22.zip
$ unzip ./base64dump_V0_0_22.zip
$ rm ./base64dump_V0_0_22.zip
$ chmod +x base64dump.py
$ pa3
###
### - test
###
$ base64dump.py -h
### ------------------
### ---- xmldump ----
$ mkdir /home/user/DidierStevensTool/xmldump
$ cd /home/user/DidierStevensTool/xmldump
$ wget https://didierstevens.com/files/software/xmldump_V0_0_7.zip
$ unzip ./xmldump_V0_0_7.zip
$ rm ./xmldump_V0_0_7.zip
$ chmod +x xmldump.py
$ pa3
###
### - test
###
$ xmldump.py -h
### ------------------
### ---- msoffcrypto-crack -----
$ mkdir /home/user/DidierStevensTool/msoffcrypto-crack
$ cd /home/user/DidierStevensTool/msoffcrypto-crack
$ wget https://didierstevens.com/files/software/msoffcrypto-crack_V0_0_5.zip
$ unzip ./msoffcrypto-crack_V0_0_5.zip
$ rm ./msoffcrypto-crack_V0_0_5.zip
$ chmod +x msoffcrypto-crack.py
$ vim msoffcrypto-crack.py
:set ff=unix
:wq
$ pa3
$ pip install msoffcrypto-tool
###
### - test
###
$ msoffcrypto-crack.py -h
### ------------------
###
### -------Didier's SpiderMonkey ---------
$ cd /home/user/DidierStevensTool
$ wget https://didierstevens.com/files/software/js-1.7.0-mod-c.zip
$ unzip js-1.7.0-mod-c.zip
$ rm js-1.7.0-mod-c.zip
$ chmod +x /home/user/DidierStevensTool/js-1.7.0-mod-c/Linux/*
$ chmod +x /home/user/DidierStevensTool/js-1.7.0-mod-c/Windows/*
### --------------------------------------
## --------------------------------------------------
##
## ---- RegRipper ----
$ cd /home/user/RegRipper3.0
$ chmod +x rip.exe
##
## - test
##
$ rip.exe -h
## -------------------
##
## ----- Arkime ------
$ mkdir ~/arkime
$ cd ~/arkime
$
## just follow official instructions at arkime HP
### download arikime .deb
$ wget (URL written in Arkime HP)
$ dpkg -i XXX.deb
##
### install elasticsearch (https://raw.githubusercontent.com/arkime/arkime/main/release/README.txt)
#### follow oficial manual
$ wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-8.6.2-linux-x86_64.tar.gz
$ wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-8.6.2-linux-x86_64.tar.gz.sha512
$ shasum -a 512 -c elasticsearch-8.6.2-linux-x86_64.tar.gz.sha512
$ tar -xzf elasticsearch-8.6.2-linux-x86_64.tar.gz
$ cd ~/arkime/elasticsearch-8.6.2/
##
#### disable TLS on elasticsearch.yml
$ vim ~/arkime/elasticsearch-8.6.2/config/elasticsearch.yml
##
##
$ sudo /opt/arkime/bin/Configure
$ /opt/arkime/db/db.pl https://localhost:9200 init
##
## set ID/PW
### user: foo_user
### password: foo_password
$ /opt/arkime/bin/arkime_add_user.sh foo_user "Admin User" foo_password --admin
##
## -------------------
##
## ----- nfdump ------
### https://github.com/phaag/nfdump
### https://gist.github.com/jjsantanna/f2ee2f1fe23208299f4a2ca392f8b23f?permalink_comment_id=3749338
### https://rc30-popo.hatenablog.com/entry/2019/02/02/000702
$ cd ~/
$ git clone https://github.com/phaag/nfdump.git
$ cd nfdump
$ sudo apt install libtool -y
$ ./autogen.sh
$ sudo apt install flex
$ sudo apt install libbz2-dev
### for nfpcapd
$ sudo apt install libpcap-dev
$ ./configure --enable-nfpcapd
$ make
$ sudo make install
$ sudo ldconfig
### test
$ nfdump -h
$ nfpcapd -h
## -------------------
##
## ----- gdbgui ------
$ pa3
$ pip install gdbgui
$ gdbgui
## -------------------
##
## ----- gdb-peda ------
$ git clone https://github.com/longld/peda.git ~/peda
$ echo "source ~/peda/peda.py" >> ~/.gdbinit
$ gdb
## -------------------
##
## ------pwntools--------
### https://docs.pwntools.com/en/stable/install.html
### python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential is needed,
### but only libssl-dev was not installed.
$ sudo apt install libssl-dev
$ pa3
$ pip install pwntools
## -------------------
##
## ------vscode-------
$ code
## -------------------
##
## ------XLMMacroDeobfuscator, msoffcrypto-tool-------
$ pa3
$ pip install XLMMacroDeobfuscator --force
$ pd
##
## - test
##
$ xlmdeobfuscator -h
##
## ---------------------------------------------------
##
## ------oletools: olevba, etc-------
### https://github.com/decalage2/oletools/wiki/Install
$ pa3
$ pip install -U 'oletools[full]'
$ olevba -h
$ pd
## ----------------------------------
##
## ----------------- trid --------------------
### https://en.kali.tools/?p=1652
$ wget https://mark0.net/download/trid_linux_64.zip
$ unzip trid_linux_64.zip
$ wget https://mark0.net/download/triddefs.zip
$ unzip triddefs.zip
$ sudo mv trid triddefs.trd /usr/local/bin/
$ rm triddefs.zip trid_linux_64.zip readme.txt
$ sudo chmod +x /usr/local/bin/trid
## --------------------------------------------
##
##
## ------------- ViperMoneky --------------------
$ pd
$ sudo apt install python2-dev
$ pa2v
$ pip install "regex<2022.1.18"
$ pip install -U https://github.com/decalage2/ViperMonkey/archive/master.zip
##
## - test
##
$ pa2v
$ vmonkey -h
$ pd
## --------------------------------------------
##
##
## ------------- Jupyter Lab --------------------
$ pa3j
$ pip install jupyterlab
$ pd
##
## - test
##
$ jupyter lab
# access web via URL with token
## --------------------------------------------
##
## ----- nmap script for smb
### https://nmap.org/nsedoc/scripts/smb-os-discovery.html
$ cd ~/
$ mkdir nmap_script_smb
$ cd nmap_script_smb
$ wget https://svn.nmap.org/nmap/scripts/smb-os-discovery.nse
## --------------------------------
##
## ------------ SecLists ------------
### this is a collection of dirctionary files.
$ cd ~/
$ git clone https://github.com/danielmiessler/SecLists.git
## ----------------------------------
##
## ----------- gobuster -----------
### https://github.com/OJ/gobuster
$ cd ~/
$ mkdir gobuster
$ cd gobuster
$ wget https://github.com/OJ/gobuster/releases/download/v3.5.0/gobuster_3.5.0_Linux_x86_64.tar.gz
$ tar -xzf gobuster_3.5.0_Linux_x86_64.tar.gz
$ rm gobuster_3.5.0_Linux_x86_64.tar.gz
## --------------------------------
##
## ----------- exploitdb -----------
$ sudo git clone https://gitlab.com/exploit-database/exploitdb.git /opt/exploitdb
$ sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit
##
## - test
##
$ searchsploit openssh 7.2
## ---------------------------------
##
## ---------- Metasploit -----------
$ cd ~/
$ mkdir Metasploit
$ cd Metasploit
$ curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
##
## - test
##
$ msfconsole
## ---------------------------------
##
## ---------- whatweb -----------
### https://github.com/urbanadventurer/WhatWeb/releases
### https://github.com/urbanadventurer/WhatWeb/wiki/Installation
$ cd ~/
$ mkdir whatweb
$ cd whatweb
$ wget https://github.com/urbanadventurer/WhatWeb/archive/refs/tags/v0.5.5.zip
$ unzip v0.5.5.zip
$ rm v0.5.5..zip
$ cd WhatWeb-0.5.5
$ sudo gem install bundler
$ sudo apt install ruby-dev
$ sudo bundle install
##
## - test
##
$ whatweb -h
## ---------------------------------
##
## ---------- zsteg -----------
### https://github.com/zed-0xff/zsteg
### https://wiki.bi0s.in/steganography/zsteg/
$ sudo gem install zsteg
##
## - test
##
$ zsteg -h
## ---------------------------------
##
## ------ pdfobjflow ---------
### https://github.com/digitalsleuth/pdfobjflow
### https://bitbucket.org/sebastiendamaye/pdfobjflow/src/master/
$ cd ~/
$ git clone https://bitbucket.org/sebastiendamaye/pdfobjflow.git
$ cd pdfobjflow
$ chmod +x pdfobjflow.py
$ pa2
$ pip install pydot
$ vim pdfobjflow.py
##
## - test
##
$ pa2
$ pdf-parser.py [sample.pdf] | pdfobjflow.py
## --------------------------
##
## -------- pwninit --------
### https://github.com/io12/pwninit
$ cd ~/
$ mkdir pwninit
$ cd pwninit
$ wget https://github.com/io12/pwninit/releases/download/3.3.0/pwninit
$ chmod +x pwninit
$ sudo apt install patchelf
##
## - test
##
$ pwninit -h
## --------------------------
##
## -------- checksec ---------
### https://github.com/slimm609/checksec.sh
### https://slimm609.github.io/checksec.sh/
$ cd ~/
$ mkdir checksec
$ cd checksec
$ wget https://github.com/slimm609/checksec.sh/zipball/main
$ unzip ./main
$ rm ./main
##
## - test
$ checksec -h
## ---------------------------
##
## -------- floss (standalone)---------
### https://github.com/mandiant/flare-floss
$ cd ~/
$ mkdir floss
$ cd floss
$ wget https://github.com/mandiant/flare-floss/releases/download/quantumstrand-preview7/quantumstrand-quantumstrand-preview7-linux.zip
$ unzip ./quantumstrand-quantumstrand-preview7-linux.zip
$ rm ./quantumstrand-quantumstrand-preview7-linux.zip
##
## - test
##
$ floss -h
##
## -----------------------------------
##
## -------- angr -------
### https://docs.angr.io/en/latest/getting-started/installing.html
$ pa3a
$ pip install angr
##
## ---------------------
##
## -------- code cell on VSCode --------------
$ pa3
$ pip install ipykernel
$ pd
$
$ pa2
$ pip install ipykernel
$ pd
## -------------------------------------------
##
## ------ patchelf ---------
$ cd ~/
$ mkdir patchelf
$ cd patchelf
$ wget https://github.com/NixOS/patchelf/releases/download/0.18.0/patchelf-0.18.0-x86_64.tar.gz
$ tar -zxvf patchelf-0.18.0-x86_64.tar.gz
$ rm patchelf-0.18.0-x86_64.tar.gz
## -------------------------
##
## ------- pwndbg ---------------------------------------------
### https://github.com/pwndbg/pwndbg
$ cd ~/
$ git clone https://github.com/pwndbg/pwndbg
$ cd pwndbg
$ ./setup.sh
##
## edit ~/.gdbinit
##
$ cat ~/.gdbinit
#source ~/peda/peda.py
#source ~/Pwngdb/pwngdb.py
#source ~/Pwngdb/angelheap/gdbinit.py
#define hook-run
#python
#import angelheap
#angelheap.init_angelheap()
#end
#end
source /home/user/pwndbg/gdbinit.py
$
##
## test
$ gdb # not pwbdbg. pwndbg command doubly calls some functions.
##
## -------------------------------------------------------------
##
## ----- set wordlist for john ----------
# 1. using "apt install john", hashcat is already installed.
# caution: my WSL cannot run hashcat.
# 2. get wordlist from some web site. e.g. rockyou.txt
$ sudo mkdir /usr/share/wordlists
$ sudo mv /mnt/c/Users/user/Downloads/rockyou.txt /usr/share/wordlists/
##
## ------------------------
before
graph = pydot.graph_from_dot_file('pdfobjflow.dot')
graph.write_png('pdfobjflow.png')
after
graph = pydot.graph_from_dot_file('pdfobjflow.dot')
for i in range(len(graph )):
filename = 'pdfobjflow_' + str(i) + '.png'
graph[i].write_png(filename)
xpack.security.autoconfiguration.enabled: false
xpack.security.enabled: false
xpack.security.http.ssl:
enabled: false
xpack.security.transport.ssl:
enabled: false
cluster.initial_master_nodes: ["DESKTOP-LM712CE"]
http.host: 0.0.0.0
-
GUI App
- Google Chrome
- VSCode
- extentions
- ANSI Colors
- Trailing Spaces
- extentions
-
install terminal emulater
$ sudo apt install terminator
- set default terminal
- customize font and color
- customize a window size of start-up
- cutomize options ... "PuTTY style paste" : ON
This enables a right click paste. - put icon on a left-top of a desktop
add launcher on panel, edit the launcher and attach terminater to it - ref. https://qiita.com/Hashibirokou/items/58cfe84975c3b3af0235
-
install clipboard tool
$ sudo apt install diodon
- set shortcut key
windows-key + v -> /usr/bin/diodon
- cutomize options ... "use primary selection" : ON
- set shortcut key
-
~/.vimrc
inoremap <silent> jj <ESC>
set relativenumber
- ~/.zshrc
# my setting
alias pa3='source /home/user/virtual_py3.11/bin/activate'
alias pa2='source /home/user/virtual_py2.7/bin/activate'
alias pd='deactivate'
alias kerbrute='/home/user/kerbrute_linux_amd64'
# Created by `pipx` on 2024-05-07 03:21:28
export PATH="$PATH:/home/user/.local/bin"
export PATH="$PATH:/home/user/chisel"
- Tools
$ sudo apt update
$ sudo apt upgrade
$ sudo apt install task-japanese task-japanese-desktop
$ sudo apt install bloodhound neo4j
$ sudo apt install enum4linux-ng
##
## ----------- enable auto-login -----------
### check gui
$ cat /etc/X11/default-display-manager
/usr/sbin/lightdm
$
### change config
$ sudo vim /etc/lightdm/lightdm.conf
...
[Seat:*]
autologin-user=user
...
$
### update and check
$ reboot
## ------------------------------------------
##
## ---------------- openvpn -----------------
##
$ sudo apt install openvpn
##
## ------------------------------------------
##
## -------------- python environment --------
# python is already installed
# virtualenv -h is worked.
# virtualenv is already installed
$ mkdir ~/virtual_py3.11
$ mkdir ~/virtual_py2.7
$ cd ~/
$ virtualenv -p python3.11 virtual_py3.11
$ sudo curl -kL https://bootstrap.pypa.io/pip/2.7/get-pip.py | python2
$ python2.7 -m pip install setuptools
$ python2.7 -m pip install virtualenv
# ...
# WARNING: The script virtualenv is installed in '/home/user/.local/bin' which is not on PATH.
# Consider adding this directory to PATH or, if you prefer to # suppress this warning, use --no-warn-script-location.
# ...
$ /home/user/.local/bin/virtualenv -p python2.7 virtual_py2.7
#
## ------------------------------------------
##
## ------pwntools--------
### https://docs.pwntools.com/en/stable/install.html
### python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential is needed,
### but only libssl-dev was not installed.
$ sudo apt install libssl-dev
$ pa3
$ pip install pwntools
## -------------------
##
## ------- pwndbg ---------------------------------------------
### https://github.com/pwndbg/pwndbg
$ cd ~/
$ git clone https://github.com/pwndbg/pwndbg
$ cd pwndbg
$ ./setup.sh
##
## edit ~/.gdbinit
##
$ cat ~/.gdbinit
#source ~/peda/peda.py
#source ~/Pwngdb/pwngdb.py
#source ~/Pwngdb/angelheap/gdbinit.py
#define hook-run
#python
#import angelheap
#angelheap.init_angelheap()
#end
#end
source /home/user/pwndbg/gdbinit.py
$
##
## test
$ gdb # not pwbdbg. pwndbg command doubly calls some functions.
##
## -------------------------------------------------------------
##
## ----------------- scapy ------------------
$ pa3
$ pip install scapy
$
## test
$ python
> import scapy
### no error
$
## -----------------------------------------
##
## ----------- kirbi2john.py ----------
$ cd ~/
$ wget https://raw.githubusercontent.com/nidem/kerberoast/907bf234745fe907cf85f3fd916d1c14ab9d65c0/kirbi2john.py
$ pa2
$ pip install pyasn1
### -----------------------------------------
##
## ----------- kerbrute ----------
### https://github.com/ropnop/kerbrute
$ cd ~/
$ wget (Github Release URL)
$ sudo chmod 755 ./kerbrute_linux_amd64
## test
$ kerbrute -h
## -------------------------------
##
## --------- Responder ----------
$ pa3
$ pip install netifaces
$ sudo apt install responder
$ pd
## ------------------------------
##
## --------- Rubeus ----------
### https://github.com/GhostPack/Rubeus
### https://github.com/r3motecontrol/Ghostpack-CompiledBinaries
$ cd ~/
$ git clone https://github.com/r3motecontrol/Ghostpack-CompiledBinaries.git
## ---------------------------
##
## --------- Mimikatz ----------
$ cd ~/
$ git clone https://github.com/ParrotSec/mimikatz.git
## -----------------------------
##
## --------- chisel ----------
### https://github.com/jpillora/chisel
$ cd ~/
$ mkdir chisel
- edit
.vscode/launch.json
- edit
setting.json
forWSL
- debug with
VSCode
- shellcode2exe.py
https://github.com/MarioVilas/shellcode_tools
I couldn't get a necessary library. It is InlineEgg.
Instead of shellcode2exe.py, I will use shellcode2exe.php that is a online site. - phpenv
https://github.com/phpenv/phpenv
I tried it, but necessary libraries are too much.
Finally, "phpenv install 8.2.10" took huge time to compile php source code and I counldn't finish it. - openVPN on WSL2
I tried to install openvpn.
However, when I run openvpn, some errors showed up.## ----- openvpn --------- apt install apt-transport-https sudo curl -fsSL https://swupdate.openvpn.net/repos/openvpn-repo-pkg-key.pub | sudo gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/openvpn-repo-pkg-keyring.gpg > /dev/null $ sudo curl -fsSL https://swupdate.openvpn.net/community/openvpn3/repos/openvpn3-kinetic.list | sudo tee /etc/apt/sources.list.d/openvpn3.list $ sudo apt update $ sudo apt install openvpn3 # - test $ sudo openvpn3 config-import --config ./hogehoge.ovpn config-import: ** ERROR ** Could not connect to the D-Bus daemon for : Could not connect: No such file or directory $ sudo service dbus start $ sudo openvpn3 config-import --config ./hogehoge.ovpn config-import: ** ERROR ** Failed preparing proxy: Error calling StartServiceByName for net.openvpn.v3.configuration: Failed to execute program net.openvpn.v3.configuration: Permission denied ### Give up
- Event Log Explorer
This tool needs a free or purchased liscence. There is also a 30-days trail liscence.
Free one has some restricted functions so when I use this tool, I want to use one with a trial liscence.
Then I don't install Event Log Exploer permanently.
- Metasploit on OpenVPN
I use Metasplit on WSL2, but sometimes getting reverse shell is difficult.
Even if I set appropriate ip adress for something like LHOSTS on Metasploit and permit FW and Proxy on Windows Host, sometimes I got error around NW setting.
I guess that it depends on an algorithm in the exploit code.
- picoCTF2021 > Binary_Exploitation > Kit_Engine
details
I created my own shellcode for executing "/bin/ls", but it doesn't work out. The binary that includes the shellcode can run in my local environment as I thought. However, using the provided "d8", the shellcode couldn't work out.