Skip to content

Commit a683006

Browse files
committed
updated
0 parents  commit a683006

File tree

403 files changed

+32250
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

403 files changed

+32250
-0
lines changed

.github/workflows/docs.yml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
name: Exploit Notes
2+
on:
3+
push:
4+
branches:
5+
- master
6+
- main
7+
permissions:
8+
contents: read
9+
pages: write
10+
id-token: write
11+
jobs:
12+
deploy:
13+
environment:
14+
name: github-pages
15+
url: ${{ steps.deployment.outputs.page_url }}
16+
runs-on: ubuntu-latest
17+
steps:
18+
- uses: actions/configure-pages@v5
19+
- uses: actions/checkout@v5
20+
- uses: actions/setup-python@v5
21+
with:
22+
python-version: 3.x
23+
- run: pip install zensical
24+
- run: zensical build --clean
25+
- uses: actions/upload-pages-artifact@v4
26+
with:
27+
path: site
28+
- uses: actions/deploy-pages@v4
29+
id: deployment

.gitignore

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
/.cache/
2+
/.venv/
3+
4+
/site/

docs/CNAME

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
exploit-notes.hdks.org

docs/about/disclaimer.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
# Disclaimer
2+
3+
Exploit Notes are only for educational purpose or penetration testing, not attacking servers that you're not authorized.
4+
This site will not take any responsibility even if you attack the server illegally or cause damage unintentionally.
5+
Please use the contents at your own risk.
6+
7+
The contents are not original, but based on the information on the internet, the author actually tried and functioned.
8+
Although the author strives to post the latest information on the content of this site as much as possible, there is no guarantee that it will always be new.
9+
10+
I'm not a security expert, just an enthusiast, so the contents written are not necessarily accurate.

docs/about/privacy-policy.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Privacy Policy
2+
3+
Last updated: July 30, 2023
4+
5+
This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.
6+
We use Your Personal data to provide and improve the Service.
7+
By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.
8+
This Privacy Policy has been created with the help of the [Privacy Policy Generator](https://www.termsfeed.com/privacy-policy-generator/).
9+
10+
## Usage Data
11+
12+
Usage Data is collected automatically when using the Service.
13+
14+
Usage Data may include information such as Your Device's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that You visit, the time and date of Your visit, the time spent on those pages, unique device identifiers and other diagnostic data.
15+
16+
When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data.
17+
18+
We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.
19+
20+
## Tracking Technologies and Cookies
21+
22+
We use Cookies and similar tracking technologies to track the activity on Our Service and store certain information.
23+
Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze Our Service.
24+
The technologies We use may include:
25+
26+
- Cookies or Browser Cookies
27+
28+
A cookie is a small file placed on Your Device. You can instruct Your browser to refuse all Cookies or to indicate when a Cookie is being sent. Unless you have adjusted Your browser setting so that it will refuse Cookies, our Service may use Cookies.
29+
30+
## Changes to this Privacy Policy
31+
32+
We may update Our Privacy Policy from time to time.
33+
You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
34+
35+
## Contact Me
36+
37+
If you have any questions about this Privacy Policy, You can contact me:
38+
39+
email: hdks.bug@gmail.com

docs/assets/images/favicon.ico

14.7 KB
Binary file not shown.

docs/assets/images/logo.png

49 KB
Loading
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# 7z Password Cracking
2+
3+
If a 7z file is protected with password, we can crack the password.
4+
5+
## Crack
6+
7+
### 1. Convert to Hash
8+
9+
First we need to convert the `.7z` file to hash.
10+
11+
```sh
12+
7z2john example.7z > hash.txt
13+
# or
14+
/usr/share/john/7z2john.pl example.7z > hash.txt
15+
```
16+
17+
If we got the error “`Can't locate Compress/Raw/Lzma.pm in @INC`...”, we need to install `libcompress-raw-lzma-perl` package so try:
18+
19+
```bash
20+
sudo apt install libcompress-raw-lzma-perl
21+
```
22+
23+
### 2. Crack the Hash
24+
25+
Now we can crack the hash with one of the commands below:
26+
27+
```sh
28+
john --wordlist=wordlist.txt hash.txt
29+
# or
30+
hashcat -m 11600 hash.txt wordlist.txt
31+
```

docs/exploit/archives/rar.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
RAR (Roshal Archive)
2+
3+
RAR is a proprietary archive file format that supports data compression, error correction and file spanning.
4+
5+
## Decrypt
6+
7+
First of all, you need to format the RAR file to make the John to recognize it.
8+
9+
```sh
10+
rar2john example.rar > hash.txt
11+
```
12+
13+
Crack the password using the formatted text.
14+
15+
```sh
16+
john --wordlist=wordlist.txt hash.txt
17+
```

docs/exploit/archives/tar.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# Tar
2+
3+
Tar command is a utility that is used to create, manipulate, and extract archived files. "tar" stands for "tape archive".
4+
5+
## Archive Files
6+
7+
```sh
8+
# -c: Create a new archive
9+
# -f: Use archive file
10+
tar -cf archive.tar example.txt
11+
tar -cf archive.tar example1.txt example2.txt
12+
# -z: filter the archive through gzip
13+
tar -zcf example.tar.gz example/
14+
```
15+
16+
## Extract Files
17+
18+
```sh
19+
# -x: Extract files from an archive
20+
# -f: Use archive file
21+
tar -xf archive.tar
22+
tar -xf archive.tar.gz
23+
# output given directory
24+
tar -xf archive.tar --directory archived
25+
```
26+
27+
## Display Contents without Extracting
28+
29+
```sh
30+
tar -tf archive.tar
31+
```

0 commit comments

Comments
 (0)