This is going to be more of a long running list of tools that I have used while doing CTFs. There’s a good chance that I’ll update/append to it as time goes on. Possibly there’ll also be the odd write up of specifics on how I use the tool.
Used for finding directory traversal on a web host.
Install:
go get github.com/OJ/gobuster
Usage:
curl -O https://raw.githubusercontent.com/digination/dirbuster-ng/master/wordlists/small.txt
gobuster dir -k -u http://$IP -w small.txt
Exploit-db is a great place for finding known exploitable vulnerabilities in software. Great if you know which version of software something is running.
If it’s a known exploit, good chance that metasploit has a module to exploit it.
Install:
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
Usage:
See the quick start guide.
If you have a reverse shell, but it’s a pain to use, and python is installed. Try this:
python -c 'import pty; pty.spawn("/bin/bash")'
More exciting payloads can be found at https://github.com/swisskyrepo/PayloadsAllTheThings
For cracking password protected Zip files
curl -L https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt > rockyou.txt
fcrackzip -v -D -p rockyou.txt archive.zip
find / -perm -u=s -type f 2>/dev/null
Just a quick dump of general tools that I use all the time: