Information Security

Home/Information Security

Information Security (IS)

1 03, 2022

Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator

2022-03-02T01:52:40+00:00Tuesday, March 1, 2022|Categories: Code Snippets, Digital Forensics|Tags: , , , , , |0 Comments

This code calculates either an MD5 and or SHA256 hash of a file and then returns one or more values.

4 01, 2022

DotNetNuker – Decrypt DotNetNuke Web Application Passwords

2022-01-04T03:29:32+00:00Tuesday, January 4, 2022|Categories: Code Snippets, Information Security|Tags: , , |0 Comments

This script will decrypt DotNetNuke TripleDES (DES3) encrypted user and administrative passwords. DNN uses DES3 with a 192 bit key for default password storage.

18 12, 2021

Simple Reverse Proxy (Reverse Shell) localhost Example

2022-01-04T02:22:45+00:00Saturday, December 18, 2021|Categories: Code Snippets, Information Security|Tags: , , , , , |0 Comments

e following code is an example of a reverse backdoor (proxy/shell) that creates a connection back to a running nc (netcat) listener hosted on our attack machine.

15 12, 2021

Enumerate Subdomains (hostnames) using the Requests Library

2022-01-04T02:18:50+00:00Wednesday, December 15, 2021|Categories: Code Snippets, Information Security|Tags: , , , , , |0 Comments

Method for resolving subdomains (enumerating hostnames) with the requests library for Python.

Go to Top