Category: Software

DIY Open Source Chronograph

I got into airsoft recently, and I wanted a way to measure the BB’s velocity. The cheapest chronographs I could find were ~60-70€. I thought making one myself would be much cheaper and a good learning experience. The total cost was about 15€. I tested it with an Army Armament R504, its specs sheet says it shoots at 300 FPS, I measured 298 FPS which is within the margin of error. All the files for the project can be found on github. Schematic Below you will find 2 versions of the schematic. One using photodiodes and the other phototransistors. Initially…

Making the ultimate IT flash drive multitool

In this guide we are going to create a flash drive with pretty much any tool you could need to diagnose and repair a pc as well as other useful tools for your everyday life. You will be able to run diagnostics, install a new OS (windows or Linux), boot into a live Linux environment, fix boot issues, run penetration testing, do data recovery, scan for malware and have a useful suite of programs of all kinds on the go. Selecting the right flash drive For what we are doing you will need a decent flash drive, a capacity of…

MDCrack how to crack hashes (MD4/MD5/NTLM1)

MDCrack is a powerful and fast hash cracker. It can brute force MD5, MD4 and NTLM1 hashes. MDCrack is mainly a CMD tool but there is a GUI available. It is available for Windows and for Linux. Usage MDCrack is easy to use but first we will need a hash to test, you can generate one using your Linux terminal or one of the many websites available. To generate an md5 hash in Linux you can use the following command I have already used this command to generate the hash to the word ‘pass’ To crack an md5 hash run…

Shredding a file in Linux with shred

When deleting a file by simply pressing the delete button the file can be easily recovered, you don’t always want that. That’s where shred comes in, What shred does is to wipe the file and make it unrecoverable. This can be very useful if you want to delete a file with sensitive data. Usage Basic options :        -f    force permissions        -u   remove after        -v   verbose        -z   write zeros at the end        -n [number]   times of shreddingIf you are not running the…

Cracking archives with rarcrack

Rarcrack is a handy tool used for cracking encrypted archives. It can be very useful if you forget the password to an encrypted archive. It supports zip, 7z and rar. But on the downside it is slow, the cracking speed depends mainly on your CPU. Usage The options :       –help displays the help file       –type [rar/zip/7z] set the archive type       –threads [2-12] set the number of threads default 2 max 12 If you are not running the command as root, you need to add sudo. Example For this example i created an encrypted 7z…

Cracking truecrypt containers with truecrack

Truecrack is a software used to crack truecrypt containers using brute force or wordlist attack. It can be useful if you have created a truecrypt container and forgotten the password. The cracking speed depends on the computers CPU. Syntax  Basic options :       -w [path] wordlist      -c “[characters]” charset for brute force      -s [number] minimum password length      -m [number] maximum password length      -v verbose modeYou can read Hydra’s documentation with the following command. Example   For this example i have created a truecrypt container with the default options with a password…

Cracking FTP with hydra

Hydra is a fast login cracker that supports a lot of protocols. It is a command line tool, but a GUI is available. The FTP (File Transfer protocol) is used to remotely access files. The cracking speed is low but with a weak password and a good wordlist it is possible to be cracked. Most attackers will try to crack a password only if there is no other way in(e.g using an exploit or social engineering). This is a list of supported protocol that hydra supports as listed in the official website :Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable,…

Sticky keys privilege escalation on windows XP

The purpose of a privilege escalation attack is to gain more privileges over an operating system. An example can be gaining administrator privileges from a restricted account on windows XP system which is what we are going to do today. How does this attack work ? This attack is a fairly simple one. The way it works is by replacing the ‘sethc.exe’ with the ‘cmd.exe’ file which are both located in the system32 folder, ‘sethc.exe’ is the application that runs when you press shift five times. Then all you have to do is press shift five times in the login…

Creating a disk image with dd

The dd command is a useful utility that allows someone to easily image a storage unit. You can use this command to backup and restore your flash drive, SD card, etc. It can also be useful for forensic work, e.g if you’re trying to recover deleted files from a flash drive, you can image the drive then work on the image keeping the original safe. WARNING This command if used improperly can result in destruction of data. Be very carefull and double check the command before executing it. Syntax You can always see the commands documentation with the fallowing command Or…