Skip to content

Commit 78e3953

Browse files
committed
bring everything up
1 parent 21f4e31 commit 78e3953

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+18582
-4
lines changed

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
.DS_Store

LICENSE

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
The MIT License (MIT)
22

3-
Copyright (c) 2013 pwnwiki
3+
Copyright (c) 2013 Rob Fuller
44

55
Permission is hereby granted, free of charge, to any person obtaining a copy of
66
this software and associated documentation files (the "Software"), to deal in

README.md

+34-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,35 @@
1-
pwnwiki.github.io
2-
=================
1+
Post Exploitation Wiki
2+
======================
33

4-
PwnWiki - Previously known as the Post Exploitation Wiki
4+
This wiki is powered by MDwiki which is a self contained wiki in a single HTML file.
5+
6+
All you have to do to use the wiki is clone the repo to anywhere you can open HTML, served or local.
7+
8+
Contributors please see here: https://github.com/mubix/post-exploitation-wiki/wiki/Contributor-Wiki
9+
10+
### Live Online Copy:
11+
12+
You can find a copy of the project online at: http://mubix.github.io/post-exploitation-wiki/. If you are reading this from the live website and want to get to the Github repository click here -> https://github.com/mubix/post-exploitation-wiki.
13+
14+
### Offline Use:
15+
16+
1. Clone the repository or pull the archive ([download zip](https://github.com/mubix/post-exploitation-wiki/archive/master.zip)) of the repo
17+
2. Open index.html
18+
3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use [Mongoose Tiny](http://cesanta.com/downloads.html) or [HFS](http://www.rejetto.com/hfs/) to host the files locally. On OSX and Linux `python -m SimpleHTTPServer` seems to work just fine.
19+
20+
### Reference Binaries:
21+
22+
If the binary referenced isn't built into the respective OS, can be found here:
23+
https://github.com/mubix/post-exploitation
24+
25+
#### Known issue with Chrome:
26+
27+
Chrome doesn't allow local file access from local files loaded in the
28+
browser (ala index.html loading index.md). There are two ways around this. Use a web server to host
29+
it (Apache, nginx, python SimpleHTTPServer, etc) or start Chrome with the `--allow-file-access-from-files`
30+
argument. See here for more details: http://dynalon.github.io/mdwiki/#!faq.md
31+
32+
33+
### More info about MDwiki:
34+
35+
http://dynalon.github.io/mdwiki/#!index.md

images/logo.jpg

38.5 KB
Loading

images/output.jpg

4.45 KB
Loading

index.html

+209
Large diffs are not rendered by default.

index.md

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
![](images/logo.jpg)
2+
3+
[Image Generated Here](http://www.addletters.com/pictures/restaurant-sign-generator/4729076.htm#.Um8oRyQeLuN)
4+
5+
### PostExploitation.com is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
6+
7+
- - - - - -
8+
9+
### Live Online Copy:
10+
11+
You can find a copy of the project online at: http://mubix.github.io/post-exploitation-wiki/
12+
13+
### Offline Use:
14+
15+
1. Clone the repository or pull the archive ([download zip](https://github.com/mubix/post-exploitation-wiki/archive/master.zip)) of the repo
16+
2. Open index.html
17+
3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use [Mongoose Tiny](http://cesanta.com/downloads.html) or [HFS](http://www.rejetto.com/hfs/) to host the files locally. On OSX and Linux `python -m SimpleHTTPServer` seems to work just fine.
18+
19+
#### Referenced tools can be found here: https://github.com/mubix/post-exploitation (If they aren't built into the OS)
20+
21+
- - - - - -
22+
#### Submitting Content
23+
24+
We realize that everyone has their favorite commands they run. Is your go-to content not up here? Want to submit it? Either submit a pull request or if you don't want to spend the time becoming a Git Jedi, just visit our [Google Form](https://docs.google.com/forms/d/1N7-jRjnUXoz-UwB2h0du2IrskFJW6hBGs4YsTwvEncE/viewform). Thanks!
25+
26+
- - - - - -
27+
Curators:
28+
29+
* [@mubix](https://twitter.com/mubix) [gimmick:TwitterFollow](@mubix)
30+
* [@WebBreacher](https://twitter.com/webbreacher) [gimmick:TwitterFollow](@WebBreacher)
31+
* [@tekwizz123](https://twitter.com/tekwizz123) [gimmick:TwitterFollow](@tekwizz123)
32+
* [@jakx_](https://twitter.com/jakx_) [gimmick:TwitterFollow](@jakx_)
33+
34+
If you would like to become a curator, please contact [[email protected]](mailto:[email protected])
35+
36+
[gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })](http://www.github.com/mubix/post-exploitation-wiki/)

links.md

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# Links
2+
3+
Hardware
4+
---------
5+
6+
| Link | Description | Cost |
7+
|------|-------------|------|
8+
| [Raspberry Pi](http://www.raspberrypi.org/) | Small board, and low cost, there is a Kali Linux that is designed to run on it, but pretty slow processor | $25 |
9+
| [PwnPlug/Pad/etc](http://pwnieexpress.com/collections/premium-pentesting-products) | Plug is a based off a Sheeva plug with an attack distro (ubuntu based) installed on it. Looks a lot like a wall wart. | $995|
10+
| [BeagleBoard Black](http://beagleboard.org/Products/BeagleBone%20Black) | Description Needed | $45 |
11+
| [Hak5 Rubber Ducky](http://hakshop.myshopify.com/collections/usb-rubber-ducky) | A USB stick that acts as a keyboard, types out payloads quickly and automatically. | $36 |
12+
| [Hak5 Wifi Pineapple](http://hakshop.myshopify.com/collections/wifi-pineapple) | Wireless attack router | $99 |
13+
| [Odroid X2](http://en.wikipedia.org/wiki/Odroid) | More RAM than the Pi (2GB) | $135 |
14+
| [Udoo](http://www.udoo.org/)| Comparable with the Odroid X2 / Pwn Plug and Raspbery Pi | $100 |
15+
| [GoodFet/Facedancer](http://goodfet.sourceforge.net/) | A open source JTAG adapter "loosely based upon the TI MSP430 FET UIF and EZ430U boards". The Facedancer board allows you to emulate USB devices so that one host can manipulate the USB devices or services of a second host. The Goodfet boards are an earlier edition of the Facedancer boards but are more general purpose, supporting JTAG and, with recent additions, USB to become a universal serial bus. | $70 [Facedancer21](http://int3.cc/collections/frontpage/products/facedancer21)<br /> $50 [GoodFET42](https://www.adafruit.com/product/1279) |
16+
17+
Software
18+
---------
19+
20+
21+
Web Apps
22+
---------
23+
24+
25+
Code Repos
26+
---------
27+
28+
| Link | Description |
29+
|------|-------------|
30+
| [Panoptic](https://github.com/lightos/Panoptic) | Finds exploitable paths for LFI and RFI |
31+
| [Daniel Miessler's SecLists Repo](https://github.com/danielmiessler/SecLists) | Solid repository of word lists for every occasion |

linux/bash.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
# Place Holder
2+
3+
Content coming. Feel free to submit ;-)

linux/blind.md

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
2+
# Linux Blind Files
3+
4+
In some cases during exploitation you as an attacker gain the ability to read arbitrary files. As an attacker you need go-to files that cover as many different OS versions as possible in order to either confirm exploitation or gather intelligence on the exploited system. For this we use a "blind file".
5+
6+
The files below are things to pull when all you can do is to blindly read. Examples of vulnerabilities or situations where this would be helpful might be: local file includes (LFI), directory traversals or remote file share instances like SMB, FTP, NFS or otherwise.
7+
8+
| File | Description / Importance |
9+
| -------- | ------------------------ |
10+
| `/etc/issue` | A message or system identification to be printed before the login prompt. |
11+
| `/etc/motd` | Message of the day banner content. Can contain information about the system owners or use of the system. |
12+
| `/etc/passwd` | List of account names, groups, home directory, and shell (should be globally readable). |
13+
| `/etc/resolv.conf` | Contains the current name servers (DNS) for the system. This is a globally readable file that is less likely to trigger IDS alerts than `/etc/passwd`. |
14+
| `/etc/shadow` | List of all user's password hashes (requires root). |
15+
| `/home/[USERNAME]/.bash_history`<br>`~/.bash_history`<br>`/root/.bash_history` | Shell history for [USERNAME], the current user or root respectively. This file can contain passwords and other sensitive commands and content. |

0 commit comments

Comments
 (0)