Blog of James Brown
2024-06-07
2024-06-03
It is not advised to do so with dual WiFi connections, which is a pain in the ass in daily usage (only one of them will be used at a time).
Ethernet and WiFi dual connections seem fine with firejail
but failed with dante
.
Use firejail
1 | sudo firejail --net=wlan0 --ip=dhcp --noprofile <program cmd> |
Use dante
and proxychains-ng
1 | sudo apt install dante-server proxychains-ng |
Now edit the dante
config file at /etc/dante.conf
:
1 | internal: eth0 port = 1080 |
Run the daemon by:
1 | danted |
Find the [ProxyList]
section and add the following line in /etc/proxychains.conf
:
1 | socks5 127.0.0.1 1080 root <root_password> |
Run the program with proxychains-ng:
1 | proxychains <program cmd> |
You can test your configuration like:
1 | curl -x socks5://root:root@127.0.0.1:1080 https://www.baidu.com |
If you run danted
like systemctl start danted
, you can configure a separate user for authentication. You have to change /etc/danted.conf
and /etc/proxychains.conf
accordingly.
1 | sudo useradd -r -s /bin/false your_dante_user |
2024-05-29
The default directory after starting parrotsec container is the filesystem root directory, which cannot run msfconsole
. Change to home directory using cd
and run metasploit afterwards.
1 | docker run --rm -it -w /root parrotsec/security |
Symlinked files are not working properly from the start. Taking msfconsole
for example, when running container from image parrotsec/security
, it will get stuck if we immediately execute msfconsole
once logged in, but we can mitigate the problem by first change into the directory where msfconsole
really locates, then execute it from there.
1 | docker run --rm -it parrotsec/security |
2024-05-27
Tutorial
https://www.authentic8.com/blog/collecting-osint-discord-guide
Google dork
1 | “search term” site:discord.com |
Websites
https://discadia.com/server/furlough/
https://discordservers.com/browse
2024-05-27
Tutorial:
https://stackoverflow.com/questions/24678308/how-to-find-location-with-ip-address-in-python
To obtain IP of ourselves, we can visit:
1 | curl https://api.ipify.org |
To get geo info of our IP, visit:
1 | curl https://ipinfo.io | jq .country |
TO get geo info of any IP, use:
https://pypi.org/project/IP2Location/
https://ip2location-python.readthedocs.io/en/latest/quickstart.html
2024-05-27
hysteria protocol is currently uncensored and undetected.
There are three kinds of anonymous browsers.
- Container based, remote desktop connected browsers
1 | docker pull linuxserver/firefox |
- Container based, browser-in-browser emulation
https://github.com/titaniumnetwork-dev/Ultraviolet-App/wiki/Deploy-via-terminal
https://github.com/BrowserBox/BrowserBox
https://browse.cloudtabs.net/signupless_session
- Builtin anonymous browser like Tor browser
2024-05-23
2024-05-22
Hashcat does not support yescript, which is a very slow hashing algorithm developed by some member in JtE. It can crack common password hashes quickly with GPU.
There are plenty of mask generation engines for hashcat. Find them with apt
.
John the Ripper only provides few formats by default. To get more formats, install john-jumbo
instead.
If the password somehow follows a pattern, use Markov chain based rainbow table generator.
2024-05-21
with llama3-v inside
https://github.com/OpenBMB/MiniCPM-V
https://github.com/mbzuai-oryx/Video-LLaVA
https://github.com/OpenGVLab/InternVL
https://github.com/THUDM/CogVLM2
PaliGemma (multimodal) from Google:
https://hf-mirror.com/google/paligemma-3b-pt-224
https://github.com/google-research/big_vision/blob/main/big_vision/configs/proj/paligemma/README.md
https://github.com/huggingface/blog/blob/main/paligemma.md
lots of open source models can be found at:
2024-05-20
Java jar file decompiler
To decompile a single jar file we need more than just jd-core, which is a commandline tool to decompile a single class file at a time.
Use jd-cli which is downloadable at here.
Commandline usage:
1 | # without docker |
Full syntax:
1 | Usage: java -jar jd-cli.jar [options] [Files to decompile] |