Friday, August 19, 2022

Metasploit Dev (Ubuntu)

Installtion Requirement for Metasploit (Git) 1. ruby 2. ruby-bundler 1. libpcap-dev 2. libpq-dev 3. libsqlite3-dev

Tuesday, August 15, 2017

Zero Fill Hard Disk in Linux

#shred -n 2 -z -v /dev/sdc1

-n 2 = number of passes
-z = overwrites hard disk data with zeroes
-v = display progress operation
/dev/sdc1 = partition

Monday, June 5, 2017

Ubuntu Dual Screen with 1 Touchscreen

$ xinput --list
⎡ Virtual core pointer                     id=2 [master pointer  (3)]
⎜   ↳ Virtual core XTEST pointer               id=4 [slave  pointer  (2)]
⎜   ↳ Advanced Silicon S.A. CoolTouch(TM) System id=11 [slave  pointer  (2)]
⎜   ↳ Dell Dell Universal Receiver             id=14 [slave  pointer  (2)]
⎜   ↳ ETPS/2 Elantech Touchpad                 id=17 [slave  pointer  (2)]
⎣ Virtual core keyboard                   id=3 [master keyboard (2)]
    ↳ Virtual core XTEST keyboard             id=5 [slave  keyboard (3)]
    ↳ Power Button                             id=6 [slave  keyboard (3)]
    ↳ Asus Wireless Radio Control             id=7 [slave  keyboard (3)]
    ↳ Video Bus                               id=8 [slave  keyboard (3)]
    ↳ Video Bus                               id=9 [slave  keyboard (3)]
    ↳ Sleep Button                             id=10 [slave  keyboard (3)]
    ↳ USB2.0 UVC HD Webcam                     id=12 [slave  keyboard (3)]
    ↳ Dell Dell Universal Receiver             id=13 [slave  keyboard (3)]
    ↳ Asus WMI hotkeys                         id=15 [slave  keyboard (3)]
    ↳ AT Translated Set 2 keyboard             id=16 [slave  keyboard (3)]

$ xrandr
Screen 0: minimum 8 x 8, current 3286 x 1080, maximum 32767 x 32767
eDP1 connected primary 1366x768+0+0 (normal left inverted right x axis y axis) 309mm x 174mm
   1366x768      60.00*+
   1360x768      59.80    59.96  
   1280x720      60.00  
   1024x768      60.00  
   1024x576      60.00  
   960x540       60.00  
   800x600       60.32    56.25  
   864x486       60.00  
   640x480       59.94  
   720x405       60.00  
   680x384       60.00  
   640x360       60.00  
HDMI1 connected 1920x1080+1366+0 (normal left inverted right x axis y axis) 477mm x 268mm
   1920x1080     60.00*+  50.00    59.94  
   1920x1080i    60.00    50.00    59.94  
   1280x1024     75.02    60.02  
   1152x864      75.00  
   1280x720      60.00    50.00    59.94  
   1024x768      75.03    60.00  
   800x600       75.00    60.32  
   720x576       50.00  
   720x576i      50.00  
   720x480       60.00    59.94  
   720x480i      60.00    59.94  
   640x480       75.00    60.00    59.94  
   720x400       70.08  
VIRTUAL1 disconnected (normal left inverted right x axis y axis)

$ xinput map-to-output 11 HDMI1

Saturday, April 22, 2017

Extract windows serial from BIOS


sudo xxd /sys/firmware/acpi/tables/MSDM

Friday, February 24, 2017

RUBY ON RAILS INSTALLATION (WINDOWS 7 x64)

Step 1

Download all the required files below:-
  1. https://dl.bintray.com/oneclick/rubyinstaller/rubyinstaller-2.3.3-x64.exe
  2. https://dl.bintray.com/oneclick/rubyinstaller/DevKit-mingw64-64-4.7.2-20130224-1432-sfx.exe
  3. https://nodejs.org/dist/v6.10.0/node-v6.10.0-x86.msi

Step 2
  1. Install rubyinstaller installer
  2. install devkit
    • create directory c:\devkit
    • extract devkit package into the directory
    • cd to the directory and type “ruby dk.rb init”
    • then type “ruby dk.rb install”
  3. Install nodejs installer

Step 3
  1. Open ruby command prompt (program files)
  2. Type “gem install rails”
  3. Type “gem install bundler”

Tuesday, December 9, 2014

BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit

Local exploit for BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit, this exploit store 2nd shellcode on heap and use egghunter to locate and copy 2nd shellcode back to stack before executing the shellcode.

https://gist.github.com/mfadzilr/c8980087db10c47bdfb6

Advantech AdamView (.gni) SEH Buffer Overflow

Local exploit for Advantech AdamView (.gni) SEH Buffer Overflow, the vulnerability does not allow lower alpha character (a to z) so i encode the shellcode with custom encoder.

https://gist.github.com/mfadzilr/7a45a7c6900ef0e86bc3