Neobits
Menu Close
  • Home
  • About
0

Tomcat default credentials dictionary attack [One-Liner]

Posted on 25/11/2017 by hecky

Quick and Dirty one-liner to perform a dictionary attack against Tomcat manager. There are many better and faster ways to perform this attack like using burp or coding it on a proper scripting language (indeed I have my own version… Continue Reading →

Quick & Dirty one-liner, oscp, tomcat
3

Native Windows commands to download files

Posted on 12/10/2017 by hecky

This is a compilation of native commands that it’s very likely to find on a windows system. If you have any other way to easily download a file, please comment it and I will update the post. The main point… Continue Reading →

Quick & Dirty download, windows
3

Writeup Offensive 100 – TrendMicro CTF 2017

Posted on 12/07/2017 by hecky

Once we downloaded the file and decrypted it we found a zip file, so the first thing was to unzip it and get the ‘Forensic_Encyption’ file. It seems to be an PE file or at least this is what the… Continue Reading →

CTF
2

WriteUp Binary 100 – CTF 19 Quals DefCon (Step by Step)

Posted on 17/02/2016 by hecky

<– Entrada incluida por DefCon.org en su colección oficial de Resolucionarios para este CTF =) –> Nos proveen del archivo b100_6817e51fa3b60f176b56 primeramente lo identificamos y vemos que es un ELF 32-bit (osea tenemos un ejecutable de linux) Al ejecutarlo vemos que nos… Continue Reading →

CTF

Recent Posts

  • Tomcat default credentials dictionary attack [One-Liner]
  • Native Windows commands to download files
  • Writeup Offensive 100 – TrendMicro CTF 2017
  • WriteUp Binary 100 – CTF 19 Quals DefCon (Step by Step)

Categories

Recent Comments

  • Samuelgom on Writeup Offensive 100 – TrendMicro CTF 2017
  • кликай и переходи на сайт on Writeup Offensive 100 – TrendMicro CTF 2017
  • hecky on Native Windows commands to download files
  • Kno on Native Windows commands to download files
  • Kno on Native Windows commands to download files
© 2021 Neobits. All rights reserved.
Neobits by @hecky