init
This commit is contained in:
57
Basic info.txt
Normal file
57
Basic info.txt
Normal file
@@ -0,0 +1,57 @@
|
||||
Password Greyhack
|
||||
Tipenycizudefo4
|
||||
|
||||
E-mail
|
||||
Vamufebotubery8
|
||||
|
||||
Bank
|
||||
iHb1mhJQ-etrandcorpai.net
|
||||
Bikasakopynehu3
|
||||
|
||||
|
||||
t2pOGi5u-ardianaml.org
|
||||
|
||||
Wallet
|
||||
user
|
||||
NlqOHvrfgcpmjyJ
|
||||
pass
|
||||
XWMNImwLcGkXESD
|
||||
|
||||
Btc subwallet
|
||||
MfGQVDCp#600
|
||||
LBjLXCbGsTeAgJnVmokUdFhAwlEtvm
|
||||
|
||||
|
||||
rshell server
|
||||
ssh root@Camycahyzapera7 46.103.11.239
|
||||
46.103.11.239
|
||||
1222
|
||||
|
||||
router
|
||||
Cekibadyvufibi5
|
||||
|
||||
|
||||
attack server
|
||||
ssh root@Tonorafyvazovo9 86.90.141.112
|
||||
|
||||
router
|
||||
Vikisihypuzacu0
|
||||
|
||||
|
||||
webhosts
|
||||
Main
|
||||
ssh root@Lanohulogyhyko1 62.142.200.139
|
||||
|
||||
router
|
||||
Tecenufugicusy2
|
||||
|
||||
|
||||
Home
|
||||
router
|
||||
Nygisosesunigu9
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
cvbnm
|
||||
7
Checkpoint.src
Normal file
7
Checkpoint.src
Normal file
@@ -0,0 +1,7 @@
|
||||
metaxploit = include_lib("/lib/metaxploit.so")
|
||||
if not metaxploit then
|
||||
metaxploit = include_lib(current_path + "/metaxploit.so")
|
||||
end if
|
||||
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
||||
server = user_input("Enter IP of Rshell_server: ")
|
||||
metaxploit.rshell_client(server,1222,"Terminal")
|
||||
33
crack.src
Normal file
33
crack.src
Normal file
@@ -0,0 +1,33 @@
|
||||
cryptools = include_lib("/lib/crypto.so")
|
||||
if not cryptools then
|
||||
cryptools = include_lib(current_path + "/crypto.so")
|
||||
end if
|
||||
if not cryptools then exit("Error: Can't find crypto.so library in the /lib path or the current folder")
|
||||
|
||||
GetPassword = function(hash)
|
||||
return cryptools.decipher(hash)
|
||||
end function
|
||||
|
||||
if not params.len >= 1 then exit("No file Specified")
|
||||
fileName = params[0]
|
||||
|
||||
if fileName.len == 32 then exit(GetPassword(fileName))
|
||||
|
||||
|
||||
|
||||
file = get_shell.host_computer.File(current_path + fileName)
|
||||
if not file then
|
||||
file = get_shell.host_computer.File(fileName)
|
||||
end if
|
||||
if not file then exit("Error: File not found in current folder or at specified location")
|
||||
|
||||
content = file.get_content.split("\n")
|
||||
output = []
|
||||
for line in content
|
||||
if line.len != 32 then output.push(line)
|
||||
if line.len == 32 then output.push(GetPassword(line))
|
||||
end for
|
||||
|
||||
for line in output
|
||||
print(line)
|
||||
end for
|
||||
57
greyhack/Basic info.txt
Normal file
57
greyhack/Basic info.txt
Normal file
@@ -0,0 +1,57 @@
|
||||
Password Greyhack
|
||||
Tipenycizudefo4
|
||||
|
||||
E-mail
|
||||
Vamufebotubery8
|
||||
|
||||
Bank
|
||||
iHb1mhJQ-etrandcorpai.net
|
||||
Bikasakopynehu3
|
||||
|
||||
|
||||
t2pOGi5u-ardianaml.org
|
||||
|
||||
Wallet
|
||||
user
|
||||
NlqOHvrfgcpmjyJ
|
||||
pass
|
||||
XWMNImwLcGkXESD
|
||||
|
||||
Btc subwallet
|
||||
MfGQVDCp#600
|
||||
LBjLXCbGsTeAgJnVmokUdFhAwlEtvm
|
||||
|
||||
|
||||
rshell server
|
||||
ssh root@Camycahyzapera7 46.103.11.239
|
||||
46.103.11.239
|
||||
1222
|
||||
|
||||
router
|
||||
Cekibadyvufibi5
|
||||
|
||||
|
||||
attack server
|
||||
ssh root@Tonorafyvazovo9 86.90.141.112
|
||||
|
||||
router
|
||||
Vikisihypuzacu0
|
||||
|
||||
|
||||
webhosts
|
||||
Main
|
||||
ssh root@Lanohulogyhyko1 62.142.200.139
|
||||
|
||||
router
|
||||
Tecenufugicusy2
|
||||
|
||||
|
||||
Home
|
||||
router
|
||||
Nygisosesunigu9
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
cvbnm
|
||||
7
greyhack/Checkpoint.src
Normal file
7
greyhack/Checkpoint.src
Normal file
@@ -0,0 +1,7 @@
|
||||
metaxploit = include_lib("/lib/metaxploit.so")
|
||||
if not metaxploit then
|
||||
metaxploit = include_lib(current_path + "/metaxploit.so")
|
||||
end if
|
||||
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
||||
server = user_input("Enter IP of Rshell_server: ")
|
||||
metaxploit.rshell_client(server,1222,"Terminal")
|
||||
33
greyhack/crack.src
Normal file
33
greyhack/crack.src
Normal file
@@ -0,0 +1,33 @@
|
||||
cryptools = include_lib("/lib/crypto.so")
|
||||
if not cryptools then
|
||||
cryptools = include_lib(current_path + "/crypto.so")
|
||||
end if
|
||||
if not cryptools then exit("Error: Can't find crypto.so library in the /lib path or the current folder")
|
||||
|
||||
GetPassword = function(hash)
|
||||
return cryptools.decipher(hash)
|
||||
end function
|
||||
|
||||
if not params.len >= 1 then exit("No file Specified")
|
||||
fileName = params[0]
|
||||
|
||||
if fileName.len == 32 then exit(GetPassword(fileName))
|
||||
|
||||
|
||||
|
||||
file = get_shell.host_computer.File(current_path + fileName)
|
||||
if not file then
|
||||
file = get_shell.host_computer.File(fileName)
|
||||
end if
|
||||
if not file then exit("Error: File not found in current folder or at specified location")
|
||||
|
||||
content = file.get_content.split("\n")
|
||||
output = []
|
||||
for line in content
|
||||
if line.len != 32 then output.push(line)
|
||||
if line.len == 32 then output.push(GetPassword(line))
|
||||
end for
|
||||
|
||||
for line in output
|
||||
print(line)
|
||||
end for
|
||||
60
greyhack/kernel 3.3.1.src
Normal file
60
greyhack/kernel 3.3.1.src
Normal file
@@ -0,0 +1,60 @@
|
||||
if params.len != 1 or params[0] == "-h" or params[0] == "--help" then exit("<b>Usage: "+program_path.split("/")[-1]+" [ip_address]</b>")
|
||||
metaxploit = include_lib("/lib/metaxploit.so")
|
||||
if not metaxploit then
|
||||
metaxploit = include_lib(current_path + "/metaxploit.so")
|
||||
end if
|
||||
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
||||
address = params[0]
|
||||
net_session = metaxploit.net_use( address )
|
||||
if not net_session then exit("Error: can't connect to net session")
|
||||
libKernel = net_session.dump_lib
|
||||
libName = "kernel_router.so"
|
||||
print("Searching " + libName +" ...")
|
||||
if not libKernel then exit("Error: " + libName + " not found.")
|
||||
lanIp = user_input("Enter a LAN address: ")
|
||||
result = libKernel.overflow("0x6E65E4F8", "bledquotesizedela", lanIp)
|
||||
|
||||
typeObject = typeof(result)
|
||||
if(typeObject != "computer") then exit("Error: expected computer, obtained " + typeObject)
|
||||
|
||||
passwd = result.File("/etc/passwd")
|
||||
|
||||
if not passwd then
|
||||
print("Passwd not found.")
|
||||
else
|
||||
print("------PASSWD------")
|
||||
users = passwd.get_content.split("\n")
|
||||
for line in users
|
||||
if not line then continue
|
||||
content = line.split(":")
|
||||
print(content[0] + "\n" + content[1] + "\n")
|
||||
end for
|
||||
end if
|
||||
|
||||
homeFolder = result.File("/home")
|
||||
if not homeFolder then
|
||||
print("/home folder not found.")
|
||||
else
|
||||
|
||||
print("------MAIL------")
|
||||
|
||||
userFolders = homeFolder.get_folders
|
||||
|
||||
for userFolder in userFolders
|
||||
mailFile = result.File("/home/" + userFolder.name + "/Config/Mail.txt")
|
||||
if not mailFile then continue
|
||||
if not mailFile.has_permission("r") then exit("Error: can't read file contents. Permission deniend")
|
||||
userPass = mailFile.get_content.split(":")
|
||||
print(userPass[0] + "\n" + userPass[1] + "\n")
|
||||
end for
|
||||
|
||||
print("------BANK------")
|
||||
|
||||
for userFolder in userFolders
|
||||
bankFile = result.File("/home/" + userFolder.name + "/Config/Bank.txt")
|
||||
if not bankFile then continue
|
||||
if not bankFile.has_permission("r") then exit("Error: can't read file contents. Permission deniend")
|
||||
userPass = bankFile.get_content.split(":")
|
||||
print(userPass[0] + "\n" + userPass[1] + "\n")
|
||||
end for
|
||||
end if
|
||||
60
kernel 3.3.1.src
Normal file
60
kernel 3.3.1.src
Normal file
@@ -0,0 +1,60 @@
|
||||
if params.len != 1 or params[0] == "-h" or params[0] == "--help" then exit("<b>Usage: "+program_path.split("/")[-1]+" [ip_address]</b>")
|
||||
metaxploit = include_lib("/lib/metaxploit.so")
|
||||
if not metaxploit then
|
||||
metaxploit = include_lib(current_path + "/metaxploit.so")
|
||||
end if
|
||||
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
||||
address = params[0]
|
||||
net_session = metaxploit.net_use( address )
|
||||
if not net_session then exit("Error: can't connect to net session")
|
||||
libKernel = net_session.dump_lib
|
||||
libName = "kernel_router.so"
|
||||
print("Searching " + libName +" ...")
|
||||
if not libKernel then exit("Error: " + libName + " not found.")
|
||||
lanIp = user_input("Enter a LAN address: ")
|
||||
result = libKernel.overflow("0x6E65E4F8", "bledquotesizedela", lanIp)
|
||||
|
||||
typeObject = typeof(result)
|
||||
if(typeObject != "computer") then exit("Error: expected computer, obtained " + typeObject)
|
||||
|
||||
passwd = result.File("/etc/passwd")
|
||||
|
||||
if not passwd then
|
||||
print("Passwd not found.")
|
||||
else
|
||||
print("------PASSWD------")
|
||||
users = passwd.get_content.split("\n")
|
||||
for line in users
|
||||
if not line then continue
|
||||
content = line.split(":")
|
||||
print(content[0] + "\n" + content[1] + "\n")
|
||||
end for
|
||||
end if
|
||||
|
||||
homeFolder = result.File("/home")
|
||||
if not homeFolder then
|
||||
print("/home folder not found.")
|
||||
else
|
||||
|
||||
print("------MAIL------")
|
||||
|
||||
userFolders = homeFolder.get_folders
|
||||
|
||||
for userFolder in userFolders
|
||||
mailFile = result.File("/home/" + userFolder.name + "/Config/Mail.txt")
|
||||
if not mailFile then continue
|
||||
if not mailFile.has_permission("r") then exit("Error: can't read file contents. Permission deniend")
|
||||
userPass = mailFile.get_content.split(":")
|
||||
print(userPass[0] + "\n" + userPass[1] + "\n")
|
||||
end for
|
||||
|
||||
print("------BANK------")
|
||||
|
||||
for userFolder in userFolders
|
||||
bankFile = result.File("/home/" + userFolder.name + "/Config/Bank.txt")
|
||||
if not bankFile then continue
|
||||
if not bankFile.has_permission("r") then exit("Error: can't read file contents. Permission deniend")
|
||||
userPass = bankFile.get_content.split(":")
|
||||
print(userPass[0] + "\n" + userPass[1] + "\n")
|
||||
end for
|
||||
end if
|
||||
Reference in New Issue
Block a user