Tag: Software

DIY Open Source Chronograph

I got into airsoft recently, and I wanted a way to measure the BB’s velocity. The cheapest chronographs I could find were ~60-70€. I thought making one myself would be much cheaper and a good learning experience. The total cost was about 15€. I tested it with an Army Armament R504, its specs sheet says it shoots at 300 FPS, I measured 298 FPS which is within the margin of error. All the files for the project can be found on github. Schematic Below you will find 2 versions of the schematic. One using photodiodes and the other phototransistors. Initially…

Making the ultimate IT flash drive multitool

In this guide we are going to create a flash drive with pretty much any tool you could need to diagnose and repair a pc as well as other useful tools for your everyday life. You will be able to run diagnostics, install a new OS (windows or Linux), boot into a live Linux environment, fix boot issues, run penetration testing, do data recovery, scan for malware and have a useful suite of programs of all kinds on the go. Selecting the right flash drive For what we are doing you will need a decent flash drive, a capacity of…

Cracking FTP with hydra

Hydra is a fast login cracker that supports a lot of protocols. It is a command line tool, but a GUI is available. The FTP (File Transfer protocol) is used to remotely access files. The cracking speed is low but with a weak password and a good wordlist it is possible to be cracked. Most attackers will try to crack a password only if there is no other way in(e.g using an exploit or social engineering). This is a list of supported protocol that hydra supports as listed in the official website :Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable,…

Sticky keys privilege escalation on windows XP

The purpose of a privilege escalation attack is to gain more privileges over an operating system. An example can be gaining administrator privileges from a restricted account on windows XP system which is what we are going to do today. How does this attack work ? This attack is a fairly simple one. The way it works is by replacing the ‘sethc.exe’ with the ‘cmd.exe’ file which are both located in the system32 folder, ‘sethc.exe’ is the application that runs when you press shift five times. Then all you have to do is press shift five times in the login…

Creating a disk image with dd

The dd command is a useful utility that allows someone to easily image a storage unit. You can use this command to backup and restore your flash drive, SD card, etc. It can also be useful for forensic work, e.g if you’re trying to recover deleted files from a flash drive, you can image the drive then work on the image keeping the original safe. WARNING This command if used improperly can result in destruction of data. Be very carefull and double check the command before executing it. Syntax You can always see the commands documentation with the fallowing command Or…