Sunday, June 15, 2025

[Chrome OS] Install Qemu and run Kali on Chrome OS

Start Penguin

Run the following commands

$ sudo apt-get update

$ sudo apt install qemu-kvm libvirt-clients libvirt-daemon-system bridge-utils virtinst libvirt-daemon virt-manager

Go back to Chrome OS's Start button and run "Virtual Machine Manager".

Download Kali qemu version to an USB flash drive before plugging the drive into Chrome OS.


Monday, March 24, 2025

[tryhackme][Windows][unpatched]Check software version to find unpatched software

 #wmic product get name,version,vendor

[tryhackme][Windows][Credential Restoration] Cred_Restoration.bat

 @echo off

echo(

echo Showing significant files...


IF EXIST "C:\Unattend.xml" (

    echo C:\Unattend.xml exists.

)


IF EXIST "C:\Windows\Panther\Unattend.xml" (

    echo C:\Windows\Panther\Unattend.xml exists.

)


IF EXIST "C:\Windows\Panther\Unattend\Unattend.xml" (

    echo C:\Windows\Panther\Unattend\Unattend.xml exists.

)


IF EXIST "C:\Windows\system32\sysprep.inf" (

    echo C:\Windows\system32\sysprep.inf exists.

)


IF EXIST "C:\Windows\system32\sysprep\sysprep.xml" (

    echo C:\Windows\system32\sysprep.inf exists.

)


IF EXIST "%userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt" (

    echo %userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt exists.

)


IF EXIST "C:\inetpub\wwwroot\web.config" (

    echo C:\inetpub\wwwroot\web.config exists.

)


IF EXIST "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.config" (

    echo C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.config exists.

)


echo(

echo Showing saved credentials on the system...


cmdkey /list


echo(

echo Show Putty Proxy passwords...


reg query HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\ /f "Proxy" /s

Sunday, March 16, 2025

[tryhackme][nmap]Hidden NMAP Scan

#nmap -e tun0 -f -T1 -D 10.10.174.103,RND,10.10.174.104,RND,ME,RND,RND -Pn 10.10.174.2


Use Fragment, Low Rate and Decoy techniques to scan 10.10.174.2

Sunday, March 9, 2025

[hydra][brute force][tryhackme] THC Hydra parameters

 -l username Provide the login name

-P WordList.txt Specify the password list (e.g. /usr/share/wordlists/rockyou.txt) to use

server service Set the server address and service to attack

-s PORT Use in case of non-default service port number

-V or -vV Show the username and password combinations being tried

-d Display debugging output if the verbose output is not helping