Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - mammon

Pages: [1]
1
Beginner's Corner / Re: Creating cheat sheets
« on: February 29, 2016, 04:43:12 pm »
I you still need a tool, I have found this one for creating cheatsheets:

https://github.com/chrisallenlane/cheat

I would also recommend the use of custom shell scripts for commands you happen to use frequently, but require many (usual common) lengthy arguments. I keep a hidden folder, i.e. .my_scripts, where i keep all my custom scripts. Don't forget to update your $PATH by appending something like this to your .(whichever_shell)_rc:

Code: [Select]
export PATH=$PATH:~/.my_scripts
Lastly, i use a lot of aliases. Bash definitely supports them, but i dont know about other shells.

EDIT:
I have also found these security related cheatsheets that use the cheat tool:

https://github.com/Snifer/security-cheatsheets which is a fork of https://github.com/andrewjkerr/security-cheatsheets

Their readme states:
Quote
These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux.

PS. I believe that the last two cheatsheets should be in a different thread, but i wanna avoid double posting. I leave it to the Mods to decide.

2
General discussion / Re: [Funny GIF] Rise of the Robots
« on: February 29, 2016, 12:32:50 pm »
There is another side to this story...   :'(

https://www.youtube.com/watch?v=uXcatFp3REg&feature=youtu.be

  ;D :P

3
Quote
By measuring the target's electromagnetic emanations, the attack extracts the secret decryption key within seconds, from a target located in an adjacent room across a wall.

https://thehackernews.com/2016/02/hacking-air-gapped-computer.html
https://motherboard.vice.com/read/how-white-hat-hackers-stole-crypto-keys-from-an-offline-laptop-in-another-room

Pages: [1]