Skip to content

Instantly share code, notes, and snippets.

View felixguerrero12's full-sized avatar
💭
not here.

Felix Guerrero felixguerrero12

💭
not here.
View GitHub Profile
@felixguerrero12
felixguerrero12 / gist:f827f512667dec30004fbcb12352839e
Created December 27, 2024 15:58
browser-signature-identifier.js
function param(t) {
var e, n = "";
for (e in t) t.hasOwnProperty(e) && (0 < n.length && (n += "&"), n += encodeURI(e + "=" + t[e]));
return n;
}
((t, e) => {
"object" == typeof exports && "object" == typeof module ? module.exports = e() : "function" == typeof define && define.amd ? define([], e) : "object" == typeof exports ? exports.ClipboardJS = e() : t.ClipboardJS = e();
})(this, function () {
return n = [function (t, e, n) {
var o;
// deviceCodeAuth.js
import { showNotification } from '../modules/uiHelpers.js';
import { fetchPostRequest } from '../modules/api.js';
import { storeToken } from './insertToken.js';
let isDeviceCodeAuthInProgress = false;
export function initializeDeviceCodeAuth() {
const form = document.getElementById('deviceCodeAuthForm');
if (form) {
Category/Subcategory, GUID
System, {69979848-797A-11D9-BED3-505054503030}
Security State Change, {0CCE9210-69AE-11D9-BED3-505054503030}
Security System Extension, {0CCE9211-69AE-11D9-BED3-505054503030}
System Integrity, {0CCE9212-69AE-11D9-BED3-505054503030}
IPsec Driver, {0CCE9213-69AE-11D9-BED3-505054503030}
Other System Events, {0CCE9214-69AE-11D9-BED3-505054503030}
Logon/Logoff, {69979849-797A-11D9-BED3-505054503030}
Logon, {0CCE9215-69AE-11D9-BED3-505054503030}
Logoff, {0CCE9216-69AE-11D9-BED3-505054503030}
EventCode,field
1,CommandLine Computer CurrentDirectory EventChannel EventDescription Hashes Image IntegrityLevel Keywords Level LogonGuid LogonId MD5 Opcode ParentCommandLine ParentImage ParentProcessGuid ParentProcessId ProcessGuid ProcessId RecordID SHA1 SHA256 SecurityID Task TerminalSessionId TimeCreated User UtcTime Version action app cmdline dest dest_asset dest_asset_id dest_asset_tag dest_bunit dest_category dest_city dest_country dest_dns dest_ip dest_is_expected dest_mac dest_nt_host dest_owner dest_pci_domain dest_priority dest_requires_av dest_should_timesync dest_should_update direction dvc dvc_asset dvc_asset_id dvc_asset_tag dvc_bunit dvc_category dvc_city dvc_country dvc_dns dvc_ip dvc_is_expected dvc_mac dvc_nt_host dvc_owner dvc_pci_domain dvc_priority dvc_requires_av dvc_should_timesync dvc_should_update eventtype hashes host index linecount parent_process parent_process_id process process_id punct session_id signature signature_id source sourcetype splunk_server tag tag::dest_requires_av
def creds = com.cloudbees.plugins.credentials.CredentialsProvider.lookupCredentials(
com.cloudbees.plugins.credentials.common.StandardUsernameCredentials.class,
Jenkins.instance,
null,
null
)
for(c in creds) {
if(c instanceof com.cloudbees.jenkins.plugins.sshcredentials.impl.BasicSSHUserPrivateKey){
println(String.format("id=%s desc=%s key=%s\n", c.id, c.description, c.privateKeySource.getPrivateKeys()))
}

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

Keybase proof

I hereby claim:

  • I am felixguerrero12 on github.
  • I am nulloop (https://keybase.io/nulloop) on keybase.
  • I have a public key ASCW83ODOG7ONbDz02S2MsvZV58tS4IqR6BPIbAbWVxR2wo

To claim this, I am signing this object:

Keybase proof

I hereby claim:

  • I am felixguerrero12 on github.
  • I am nulloop (https://keybase.io/nulloop) on keybase.
  • I have a public key whose fingerprint is 7941 7414 8D06 0141 6778 8C34 DD64 5600 20FD 2658

To claim this, I am signing this object: