first whack at nav reorg

This commit is contained in:
Rob Fuller 2013-12-26 13:08:13 -05:00
parent 68644fefb7
commit be072ead31
45 changed files with 110 additions and 148 deletions

0
cats/ncat.md → 2besorted/cats/ncat.md Executable file → Normal file
View File

0
cats/netcat.md → 2besorted/cats/netcat.md Executable file → Normal file
View File

0
cats/socat.md → 2besorted/cats/socat.md Executable file → Normal file
View File

View File

@ -1,68 +1,68 @@
# OS X Google Doc Content #
The content below is the raw data from the Google Doc that was first used to collect it. Over time, this content will be moved into sub-pages and organized but is placed here, now, so as to be more complete. We apologize for its appearance.
----
## Blind Files
(things to pull when all you can do is blindly read) LFI/dir traversal
/etc/resolv.conf (everyone always has read on this and it wont trigger an IDS)
## System
<code>uname -a
ps aux
ps -aef
id
arch
w
who -a
gcc -v
mysql --version
perl -v
ruby -v
python --version
df -k
mount
last -a
lastlogin (*bsd)
getenforce <- does not work on Lion no idea if this work in previous versions
dmesg
lsusb<- does not work on Lion no idea it this work on previous versions
lshw <- does not work on Lion no idea it this work on previous versions
free -m <- does not work on Lion no idea it this work on previous versions
du -h --max-depth=1 /
which nmap (see if it's already installed)
locate bin/nmap
which nc (see if it's already installed)
locate bin/<whatever you want>
whoami
jps -l
java -version</code>
## Networking
<code>hostname -f
ip addr show
ifconfig -a
route -n
cat /etc/network/interfaces
iptables -L -n
netstat -anop
netstat -r
netstat -nltupw (root with raw sockets)
arp -a
lsof -nPi</code>
## Per User
<code>ls -alh /Users/*/
ls -alh /Users/*/.ssh/
cat /Users/*/.ssh/authorized_keys
cat /Users/*/.ssh/known_hosts
cat /Users/*/.*hist*
find -type f /Users/*/.vnc /Users/*/.subversion
grep ^ssh /Users/*/.*hist*
grep ^telnet `/Users/*/.*hist*
grep ^mysql /Users/*/.*hist*
cat /Users/*/.viminfo
sudo -l # if sudoers is not readable, this sometimes works per user
crontab -l</code>
# OS X Google Doc Content #
The content below is the raw data from the Google Doc that was first used to collect it. Over time, this content will be moved into sub-pages and organized but is placed here, now, so as to be more complete. We apologize for its appearance.
----
## Blind Files
(things to pull when all you can do is blindly read) LFI/dir traversal
/etc/resolv.conf (everyone always has read on this and it wont trigger an IDS)
## System
<code>uname -a
ps aux
ps -aef
id
arch
w
who -a
gcc -v
mysql --version
perl -v
ruby -v
python --version
df -k
mount
last -a
lastlogin (*bsd)
getenforce <- does not work on Lion no idea if this work in previous versions
dmesg
lsusb<- does not work on Lion no idea it this work on previous versions
lshw <- does not work on Lion no idea it this work on previous versions
free -m <- does not work on Lion no idea it this work on previous versions
du -h --max-depth=1 /
which nmap (see if it's already installed)
locate bin/nmap
which nc (see if it's already installed)
locate bin/<whatever you want>
whoami
jps -l
java -version</code>
## Networking
<code>hostname -f
ip addr show
ifconfig -a
route -n
cat /etc/network/interfaces
iptables -L -n
netstat -anop
netstat -r
netstat -nltupw (root with raw sockets)
arp -a
lsof -nPi</code>
## Per User
<code>ls -alh /Users/*/
ls -alh /Users/*/.ssh/
cat /Users/*/.ssh/authorized_keys
cat /Users/*/.ssh/known_hosts
cat /Users/*/.*hist*
find -type f /Users/*/.vnc /Users/*/.subversion
grep ^ssh /Users/*/.*hist*
grep ^telnet `/Users/*/.*hist*
grep ^mysql /Users/*/.*hist*
cat /Users/*/.viminfo
sudo -l # if sudoers is not readable, this sometimes works per user
crontab -l</code>

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)

View File

@ -2,68 +2,55 @@
[Home](index.md)
[Windows]()
[Presence]()
* [Autostart Locations](windows/autostart.md)
* [Binary Planting](windows/binary.md)
* [CMD Commands](windows/cmd.md)
* [Covering Tracks](windows/cover.md)
* [Files - Blind](windows/blind.md)
* [Files - Finding](windows/find_files.md)
* [Files - Important](windows/files.md)
* [Persistance](windows/persistance.md)
* [Powershell](windows/powershell.md)
* [Privilege Escalation](windows/privesc.md)
* [Remote Access](windows/remote.md)
* [UAC Bypassing](windows/uac.md)
* [MSSQL Servers](windows/mssql.md)
* [Windows](presence/windows/index.md)
* [Linux](presence/linux/index.md)
* [OSX](presence/osx/index.md)
[Linux]()
[Persistence]()
* [Google Doc Content](linux/bulk.md)
* [Files - Blind](linux/blind.md)
* [Files - Finding](linux/find_files.md)
* [SH/BASH Commands](linux/bash.md)
* [Persistance](linux/persistance.md)
* [Privilege Escalation](linux/privesc.md)
* [Windows](persistence/windows/index.md)
* [Linux](persistence/linux/index.md)
* [OSX](persistence/osx/index.md)
[Pivoting]()
[OSX]()
* [Windows](pivoting/windows/index.md)
* [Linux](pivoting/linux/index.md)
* [OSX](pivoting/osx/index.md)
* [Bash Commands](osx/bash.md)
* [Files - Blind](osx/blind.md)
* [Files - Finding](osx/find_files.md)
* [Persistance](osx/persistance.md)
* [Privilege Escalation](osx/privesc.md)
[Privilege Escalation]()
* [Windows](privesc/windows/index.md)
* [Linux](privesc/linux/index.md)
* [OSX](privesc/osx/index.md)
[Mobile]()
* [Android](mobile/android.md)
* [iOS](mobile/ios.md)
[Other OSs]()
[Technologies]()
* [zOS](otheros/zos.md)
* [AS/400](otheros/as400.md)
* [Cisco](otheros/cisco.md)
* [Juniper](otheros/juniper.md)
* [Mainframes](tech/mainframes/index.md)
* [Embedded OSs](tech/embedded/index.md)
* [Web Languages](tech/web/languages.md)
* [Web Apps](tech/web/apps.md)
* [Web Servers](tech/web/servers.md)
* [Network Services](tech/services/index.md)
* [Databases](tech/db/index.md)
[Scripting]()
* [Python](scripting/python.md)
* [Powershell](scripting/powershell.md)
* [Ruby](scripting/ruby.md)
* [Perl](scripting/perl.md)
* [Windows](scripting/windows.md)
* [NodeJS](scripting/NodeJS.md)
* [Linux bash](scripting/bash.md)
[Cats]()
* [ncat](cats/ncat.md)
* [netcat](cats/netcat.md)
* [socat](cats/socat.md)
[Metasploit]()
* [Meterpreter](msf/meterpreter.md)
@ -77,7 +64,6 @@
* [Unix Rosetta Stone](references/rosetta.htm)
[Links](links.md)
[gimmick:themechooser](Wiki Theme)
@ -92,3 +78,4 @@ return false;
});
});
</script>

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)

0
presence/linux/index.md Normal file
View File

30
osx/find_files.md → presence/osx/find_files.md Executable file → Normal file
View File

@ -1,15 +1,15 @@
# OS X Finding File Commands
Commands that find files on the filesystem and are usually executed from the context of the shell (`/bin/bash` or `/bin/sh`) prompt.
| Command | Description / Importance |
| -------- | ------------------------ |
| `find /sbin /usr/sbin /opt /lib` &#96;`echo $PATH` &#124;`'sed s/:/ /g'`&#96;` -perm -4000` | Find SUID files. |
| `for user in $(cut -f1 -d: /etc/passwd); do echo $user; crontab -u $user -l; done` | Lists all the user crontab or scheduled tasks files. |
| `find /var/log -type f -exec ls -la {} \;` | Find all the log files in `/var/log/` |
| `ls -alhtr /Volumes` | Display the volumes mounted at `/Volumes` |
| `ls /Users/*/.ssh/*` | Discover SSH files (keys and such) located in each user's home drive. May require root permissions to view these files in other user's directories. |
| `locate tar` &#124; `grep [.]tar$` | Finds all files that have a `.tar` extension. Substitute other archive extensions (e.g., `.zip`, `.7z`, `.rar`) or other extensions such as `.sql` or `.conf`. |
| `locate settings` $#124; `grep [.]php$` | Find all files with the word settings in it and with a `.php` extension. |
| `locate .properties` $#124; `grep [.]properties` | Finds Java configuration files. |
# OS X Finding File Commands
Commands that find files on the filesystem and are usually executed from the context of the shell (`/bin/bash` or `/bin/sh`) prompt.
| Command | Description / Importance |
| -------- | ------------------------ |
| `find /sbin /usr/sbin /opt /lib` &#96;`echo $PATH` &#124;`'sed s/:/ /g'`&#96;` -perm -4000` | Find SUID files. |
| `for user in $(cut -f1 -d: /etc/passwd); do echo $user; crontab -u $user -l; done` | Lists all the user crontab or scheduled tasks files. |
| `find /var/log -type f -exec ls -la {} \;` | Find all the log files in `/var/log/` |
| `ls -alhtr /Volumes` | Display the volumes mounted at `/Volumes` |
| `ls /Users/*/.ssh/*` | Discover SSH files (keys and such) located in each user's home drive. May require root permissions to view these files in other user's directories. |
| `locate tar` &#124; `grep [.]tar$` | Finds all files that have a `.tar` extension. Substitute other archive extensions (e.g., `.zip`, `.7z`, `.rar`) or other extensions such as `.sql` or `.conf`. |
| `locate settings` $#124; `grep [.]php$` | Find all files with the word settings in it and with a `.php` extension. |
| `locate .properties` $#124; `grep [.]properties` | Finds Java configuration files. |

View File

@ -1 +0,0 @@
# DNS Configuration Issues

View File

@ -1 +0,0 @@
# Insecure Protocols

View File

@ -1 +0,0 @@
# Linx/UNIX Configuration Issues

View File

@ -1 +0,0 @@
# SMTP Configuration Issues

View File

@ -1 +0,0 @@
# SNMP Configuration Issues

View File

@ -1 +0,0 @@
# SSL/TLS Certificate Issues

View File

@ -1 +0,0 @@
# Windows Configuration Issues

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)

View File

@ -1,3 +0,0 @@
# Place Holder
Content coming. Feel free to submit ;-)