Programming
Programming
Port scanner in python
Generating base64 words in Python
Convert Windows registry from hex to ascii in Python
Reading all folder files and searching with regex in Python
Building an encrypted web server with ssl in Python
Web server with Python
Sending email in python (* sendmail must be installed)
Get the file from http and run it
Receiving the banner in python (* the range of ip and ports and its delay should be specified)
Scrapy command
When you craft TCP packets with Scapy, the underlying OS will not recognize the initial SYN packet and will reply with a RST packet. To mitigate this you need to set the following Iptables rule: iptables -A OUTPUT -p tcp –tcp-flags RST RST -j DROP
phrase
Explanation
from scapy.all import *
Loading all scapy libraries
ls ()
List of all protocols
lsc ()
list of all functions
conf
Display and settings
IP(src=RandiP())
Generate random destination IP
Ether(src=RandMAC() I
Generate random destination MAC
ip=IP(src=”1.1.1.1”,dst=”2.2.2.2”)
Change the ip parameter
tcp=TCP(dport=”443”)
Change the tcp parameter
data= “TCP data”
specify the data part
packet=ip/tcp/data
Create ip and tcp package
packet.show()
Show package settings
send(packet,count=1)
send 1 packet to layer 3
sendp(packet,count=2)
Send 2 packets to layer 3
sendpfast(packet)
Send faster with tcpreply
sr(packet)
Send 1 package and get the result
sr1(packet)
Post only one reply
for i in range(0,1000): send (packet·)
Send a set a thousand times
sniff(count=100,iface=eth0)
Listen for hundred packets on eth0
Send icmp message on ipv6
udp package and payload
Ntp fuzzer operation
Send message http
Perl language
Port scanner
regex rules
Law
Explanation
^ start
* Zero or more
+ one or more
?
Zero or one
.
All characters up to
{3} Exactly three
{3,}
Three or more
{3,5}
Three or four or five
{3|5}
Three or five
[345]
Three or four or five
[ ^34]
Apart from three or four
[a-z]
letters a-z
[A-Z]
Letters A-Z
[0-9]
Digits 0-9
\d
Digits
\D
Except for the digit
\w
All A-Z, a-z, 0-9
\W
Except A-Z,a-z,0-9
\s
Empty space (\t\r\n\f)
\S
Except (\t\r\n\f)
reg[ex]
“rege” or “regx”
regex?
'’rege’’ or ‘‘regex’’
regex*
``rege’’ w/ 0 or more x
regex+
``rege’’ w/ 1 or more x
[Rr]egex
'’Regex’’ or ‘‘regex’’
\d{3}
Exactly three digits
\d{ 3,)
Three or more digits
[aeiou]
Each one
(0 [3-9] |1 [0-9]|2 [0-5])
Range 03 to 25
nested extract with bash
Some examples of commonly hooked Windows API functions
API
Description
CreateProcess
This API function is used to start a new process. By hooking this function, malware can intercept calls to create new processes and inject its code into them, allowing it to execute in the context of the newly created process.
LoadLibrary/LoadLibraryEx
These functions are used to load dynamic link libraries (DLLs) into a process’s address space. By hooking these functions, malware can inject its code into a target process by loading a malicious DLL.
RegOpenKeyEx/RegCreateKeyEx
These functions are used to access and create registry keys. By hooking these functions, malware can monitor and modify the registry, which can be used to maintain persistence or evade detection.
NtCreateFile/NtOpenFile
These functions are used to create or open files on disk. By hooking these functions, malware can intercept calls to access sensitive files, such as password files or system configuration files.
SendMessage
This function is used to send a message to a window or control in a user interface. By hooking this function, malware can monitor and modify user input, which can be used to steal sensitive information such as login credentials or credit card numbers.
CreateFile
this API is used to create or open a file, and is often hooked to allow malware to hide its own files or open and modify existing files.
RegOpenKeyEx
this API is used to open a registry key, and is often hooked to allow malware to modify or delete registry keys, which can be used for persistence or to disable security software.
InternetConnect
this API is used to connect to a remote server over the internet, and is often hooked to allow malware to communicate with a command and control server.
LoadLibrary
this API is used to load a dynamic link library (DLL) into memory, and is often hooked to allow malware to load its own DLLs or to hijack legitimate DLLs.
SetWindowsHookEx
this API is used to install a hook procedure for a specific system-wide event, such as a keystroke or mouse click, and is often hooked to allow malware to monitor user activity or to inject code into other processes.
CreateFile
used to create or open a file or device object. Hooking this API can allow malware to intercept attempts to access certain files or devices, and potentially modify or redirect those requests.
SetWindowsHookEx
used to set a system-wide or thread-specific hook procedure for certain types of events, such as mouse or keyboard input. Hooking this API can allow malware to monitor or manipulate user input or system behavior.
InternetConnect
used to establish a connection to an FTP, HTTP, or HTTPS server. Hooking this API can allow malware to intercept or modify network traffic, potentially allowing it to steal sensitive information or carry out other malicious actions.
CreateProcessA/W
used to create a new process. Malware can hook this API to inject code into a legitimate process or to hide its presence by running as a child process of a legitimate application.
RegCreateKeyExA/W
used to create a new registry key. Malware can hook this API to create persistence by creating a new registry key that will ensure the malware runs every time the system is started.
GetProcAddress
used to retrieve the address of a function in a DLL module. Malware can hook this API to hide its presence by preventing security software from detecting the functions it is using.
InternetConnectA/W
used to connect to an FTP, HTTP, or HTTPS server. Malware can hook this API to steal sensitive data such as passwords and login credentials.
NtQuerySystemInformation
used to retrieve system information such as running processes and drivers. Malware can hook this API to hide its presence by preventing security software from detecting its processes and drivers.
NtQuerySystemInformation
this API is commonly hooked by malware to hide its processes and drivers, making it more difficult for security software to detect its presence on the system.
Last updated