This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1.Verify root access | |
/*Drag & Drop sudo | |
This is a trick from this thread on the Ubuntu Forums. | |
Create a launcher with the following command: | |
gksudo "gnome-open %u" | |
When you drag and drop any file on this launcher (it's useful to put it on the desktop or on a panel), it will be opened as Root with its own associated application. This is helpful especially when you're editing config files owned by Root, since they will be opened as read only by default with gedit, etc | |
https://help.ubuntu.com/community/RootSudo |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Just set your own root password: | |
utilite@utilite-ubuntu-desktop:~$ whoami | |
utilite | |
utilite@utilite-ubuntu-desktop:~$ sudo -i | |
[sudo] password for utilite: /* enter password for the utilite user | |
root@utilite-ubuntu-desktop:~# whoami | |
root | |
root@utilite-ubuntu-desktop:~# passwd root | |
Enter new UNIX password: /* enter password for the root user |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Kali-ARM-Build-Scripts | |
====================== | |
Offensive Security Kali Linux ARM build scripts. We use these to build our official Kali Linux ARM images, | |
as can be found at http://www.kali.org/downloads/ | |
- These scripts have been tested on a Kali Linux 32 and 64 bit installations only, after making sure | |
that all the dependencies have been installed. | |
- Make sure you run the build-deps.sh script first, which installs all required dependencies. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/*We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a Galaxy Note or a USB stick sized SS808, we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the Utilite pro. | |
Utilite Pro is a quad core ARM cortex-A9 machine with up to 4 GB of RAM, up to 512 GB mSATA SSD, HDMI and DVI-D output, dual (2x) 1GB nics, a built in wireless card and 4 USB ports. And its fanless. With those type of specs, this little beauty was unlikely to skip our radars. We wanted Kali Linux on that baby, real bad. | |
We took this opportunity to create and publish the Offensive Security Kali Linux contributed ARM images, and thought we’d demonstrate the use of these scripts, and show you how to get Kali linux on the Utilite Pro. From there, the options are endless. | |
The Utilite Pro came with Ubuntu preinstalled. The first thing we wanted to do, is update the machines uBoot bootloader image, to allow for support of 1.8V microSD cards.*\ | |
***************** |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
#Copyright (c) 2010 Jeff Bryner | |
#http://jeffbryner.com | |
#python script to gather googletoolbar traffic and snoop on it. | |
#This program is free software; you can redistribute it and/or modify it under | |
#the terms of the GNU General Public License as published by the Free Software | |
#Foundation; either version 2 of the License, or (at your option) any later | |
#version. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
SPEED= | |
ENUM= | |
PORTS= | |
XPLOIT= | |
TARGET= | |
while getopts ":s:e:p:x:t:" OPTIONS | |
do |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#Save all monitor interfaces in a list | |
################################################################################ | |
xterm -geometry 0x0 -e "iwconfig |grep "Mode:Monitor" >> /tmp/mon.txt" & wait | |
#Menu | |
################################################################################ | |
echo "-----------------------------------------------" | |
echo "* MacMon v1.5 -- b33f *" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
INPUT= | |
OUTPUT= | |
TYPE= | |
while getopts ":i:o:t:" OPTIONS | |
do | |
case $OPTIONS in | |
i) INPUT=$OPTARG;; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import binascii | |
import random | |
import optparse | |
# Help Menu | |
############################################################################## | |
if __name__=="__main__": |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for /f "delims=" %%A in ('dir /s /b %WINDIR%\system32\*htable.xsl') do set "var=%%A" | |
wmic process get CSName,Description,ExecutablePath,ProcessId /format:"%var%" >> out.html | |
wmic service get Caption,Name,PathName,ServiceType,Started,StartMode,StartName /format:"%var%" >> out.html | |
wmic USERACCOUNT list full /format:"%var%" >> out.html | |
wmic group list full /format:"%var%" >> out.html | |
wmic nicconfig where IPEnabled='true' get Caption,DefaultIPGateway,Description,DHCPEnabled,DHCPServer,IPAddress,IPSubnet,MACAddress /format:"%var%" >> out.html | |
wmic volume get Label,DeviceID,DriveLetter,FileSystem,Capacity,FreeSpace /format:"%var%" >> out.html | |
wmic netuse list full /format:"%var%" >> out.html | |
wmic qfe get Caption,Description,HotFixID,InstalledOn /format:"%var%" >> out.html |
NewerOlder