Files

487 lines
26 KiB
Plaintext
Raw Permalink Normal View History

Episode: 3491
Title: HPR3491: My Github and flickmetrix
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3491/hpr3491.mp3
Transcribed: 2025-10-25 00:22:39
---
This is Haka Public Radio episode 3491 for Monday the 20th of December 2021.
Today's show is entitled, MyGidHub and FlickMetrics.
It is hosted operator, and is about 26 minutes long, and carries an explicit flag.
The summer is, bear with me as I go though MyGidHub over the past year some real gems
in the end.
Hello everyone, I'm Malcolm Duna, the episode of Haka Public Radio with your host operator.
Today I'll be talking about kind of going over what I've stuff I've been working on,
and FlickMetrics, which I'm going down my HPR list in order of chronological order.
I do have IT stories that I will go over eventually, but the next one on the list is been
on there for a while since August is FlickMetrics.
So while I'm doing FlickMetrics stuff, which is probably a five minute podcast, I'm going
to kind of quickly go over the stuff I've been working on, mainly Windows, Unix, Linux,
and it's all in GitHub.
So I will put the link in the show notes obviously to MyGidHub, but I'm going to kind of quickly
go over how I've been using GitHub and kind of probably incorrectly, but for the main
thing is just a lot of my stuff is in a Scripts folder.
Some of it is sort of organized, but at least this time around, instead of having a giant
Food.Tex, which is where all my kind of one liners and little small scripts are, everything
is kind of organized a little, well, let's see, we're breaking out into folders.
So I'm not sure the right way to to chop all this stuff up if each application needs
to be its own repo, I guess.
Anyways, I haven't actually studied or done any research, so I'm not looking for answers
I can Google.
But anyways, I'm using GitHub mainly just to hold some of my content because my website,
personal website has kind of been blocked and nobody really blocks GitHub.
So that has some advantages around custom binaries and code that would normally get flagged
or executables or binary packages that normally get flagged by Windows specifically.
That allows me to work around that.
So quickly, anyways, we're going to go over, I don't know how chronological order or just
just order of how I've got everything set up.
First is Bounce Scripts.
It's going to be main one's AutoHotkey.
The only one I've added here, I have plenty of AutoHotkey scripts that I don't use anymore.
This one is a toggle high contrast in Windows and I've been playing around a little bit
with high contrast mode in Windows.
I've been happy with it so far.
There have been a few times and a few sites that do not follow the rules of high contrast
mode, and that kind of tends to make things weird, specifically, usually it's like when
you're trying to select text, it doesn't follow the right logic and you'll end up not
seeing anything or buttons will essentially not be there that aren't there in non-high contrast
mode.
So, actually right now, it doesn't even look like I'm in high contrast mode.
There we go.
A lot of the websites have a dark mode or whatever, so sometimes it's hard for me to tell
until I'm actually in an application or looking at the start menu that I'm actually not
in high contrast mode.
For me, it helps visually, whatever.
Anyways, I'm, I'm, I'm rambling.
Auto-hockey, I have an executable, I have the Auto-hockey source and a little screenshot.
That's under the scripts folder, nothing to be said there.
Let's see, I've got some bass scripts, CS Badgers for CrowdStrike if you're in the CrowdStrike.
Not going to play claim to be any kind of expert in bass profile, but I was working on a
bass profile.
CSTI is a CrowdStrike script that will pull threat intelligence.
That's super useful.
Domain to IP basically will take a domain and convert that to any IP addresses that are
attached to that domain using the website CRT.SH and it will pull all the SSH certificates
that exist that it knows about and then it will pull the IPs to those and then potentially
scan them if I remember correctly.
Anyways, it's a little one-liner domain recon, it's a bass script to do a bunch of domain
recon stuff, so if you have a bunch of websites and you want to quickly tell about things
about them, that's all I think done in bass, it doesn't require anything else.
Jetsie installer for Docker, in that smart fast, I think I did a podcast on this where
it kind of semi-intelligently will scan the longer 172 to not ranges.
Umbi is a different script for updating Plex, which is a media server.
Umbi is a request system where you can request up to be downloaded, so I wrote an update
script for Umbi.
I don't even know if I've even updated that, but it's an example.
Plex cleanup script, that one's actually kind of cool.
If you want to see some kind of interesting scripting as far as rejects inside of the
fine command for Linux, there's some pretty cool things you can do.
Plex kernel panic search that was a fruitless effort trying to figure out why Plex was crashing
in whatever. Plex update script, that one's pretty cool, we'll update Plex automatically
and not run as root, it runs it in a user land, so it will put it all in its own thing.
Not necessarily jailed, obviously, but it's through updating Plex outside of the kind of
a Uper user setup.
RmMP will clean, kind of clean up your folder.
The RmMP and Plex cleanup scripts probably are the same thing, yes, they're more or less
the same thing.
One of them is slightly larger with some different rejects in it, so there are some instances
where I already knew something and then re-uploaded it, because I forgot that I uploaded it.
Stream to text, I did a podcast on that one, subsonic set new, it says default home screen.
I gave up on subsonic and switched to Plex for my streaming audio, subsonic patches,
and I remember that.
The Plex metrics, good movies, SH, so that's what I was talking about, basically this
pulls FlickSmetrics, which is a website that has rankings and stuff for websites, FlickMetrics.com
with an X.
They have an EPI that will pull back JSON and part of that JSON fairly simply, and then create
a little movies list, so I can see what good movies are out, and it works okay.
Let's pretty much it for the bash folder, let's see what else we got, and I'll go over
the rest of them quickly and let you go.
CrowdStrike thread hunting, that's self-explanatory, there's some thread hunting scripts in there,
CrowdStrike, some JavaScript stuff, and work in progress for a wish.com price filter that
will have the shipping information in there.
It looks like I hack in the box thing, some JavaScript for something, I don't remember.
Anyways, podcasts, posts, I'm not sure what that's for actually.
Universal Android, SSLPing, bypassed.
If you've ever done any stuff with Frida, or what's the other one, Frida is a tool that
you can use to inspect, basically, mobile applications, and there's another one called
Objection.
With those two tools that you can do things like bypass SSL, try to bypass SSLPing, this
will do a bunch of different SSLPing tricks, and it took me a while to find this, so that
one's actually pretty cool.
It's called Universal Android, SSLPing, bypassed with Frida.
I think I renamed it to be more friendly because it took me a lot to find that link again.
It's pretty much all the job of stuff, let's see what else we got.
Windows, Batch, PowerShell, there's a bunch of Windows, Batch stuff in here, really fun
stuff.
CS Diag, that's for Windows, that will help you like uninstall or reinstall CrowdStrike sort
of.
It's just when when LogBeat installs, this will automatically install when LogBeat and
SysMom and set it all up for help.
I took all the Android Dipload scripts that I could possibly find, all the apps that
I could possibly find that were in theory safe to disable or remove, and I wrote a script
that will automatically pull down all the stuff you need, all the binaries you need, all
the drivers you need to basically automatically deplow your phone, whether you're in Russia
with whatever providers they have, and you have a Samsung, or if you've got some other
branded phone, and you're in carriers, or carriers have their own hardware and their
own garbage, and the manufacturers have their own garbage, so I have a Samsung with Verizon.
So not only do I have a bunch of crap on there from Samsung, I have a bunch of crap on
there from Verizon, and then I also have crap on there from work.
So there's like three different things, and the problem with Android is you can't just
willingly remove stuff because you might get in a boot, loop crash, whatever, and you
won't be able to actually boot the phone into any kind of whatever.
So I haven't run this fully, I ran some pretty big ones, but I haven't run this one.
It's a combination of every single script that I could possibly find that it would remove
malware.
It's like spyware or whatever you want to call it, junk.
Well, anyways, Android Logcat will basically take the Android log file and analyze it because
their battery analyzers are all garbage and they don't actually tell you what app is
you doing, what, so this will create basically help you debug anything wrong with your phone
regardless of whether or not the apps tell you what's wrong with your phone.
They don't, the battery apps, I had some issues with my Android and I would lay it down
and it would idle hot, then I did a full reset, same thing, idle hot, I would pick up the
phone and it would be warm, and I kept using all these battery, better battery stats and
all this other stuff and it would ask for root and it would ask for like the debug command
you'd have to like allow something through like ADB and like plug in USB and do all this
crazy stuff.
And at the end of the day, it would be like Android kernel is using up 47% of your whatever
and it was just useless.
So finally, for whatever reason, I was trying to figure out not do this, which would end
it up taking me like not even 30 minutes to write this script.
Instead of doing that, I went through all these stupid battery apps scripts that would
hopefully tell me what was going on with my phone, but it was just like the CPU is back
to me on the line.
So Android Logcat, it's pretty cool.
Bleachbit quickkill will essentially take my quickkill script and combine it with Bleachbit
and Bleachbit is weird.
I don't really want to get into it, but I'll breeze over it.
Bleachbit doesn't let you easily select all the options to uninstall.
Now, if you've ever done CC Cleaner or CC Cleaner, I'm sorry, it will remove a bunch of
stuff and it's got a UI and they do have a command line thing, but it's weird that like
if you're if you haven't run it in a while, it'll be like you need to download the latest
one and we can't we can't really run this or it's obviously, you know, doesn't want
you to write it to use it or commercial or whatever.
It's it's just gotten bloated and just too corporate.
So I went to go update my own script that was called Quick Clean and I realized that, you
know, the thing was 15 years old or 10 years old and I said there's got to be something
else out there that uses these same paths, essentially, because you're all you're really
doing with these cleaners is pulling out paths, file types, file extensions and, you know,
registry keys.
So I think that's all you need is like a list.
So I found this stuff on GitHub and I started searching around and there's a couple of
cleaners out there and bleach bits seem to do have the latest and greatest and the most
complete killing apparatus of all the junk that you don't need.
Now the cool thing about this bleach bit, quick kill is it does a few extra things.
It will create or run the normal, it runs the normal cleaner, the normal windows cleaner
which is called clean manager and it does some registry key stuff to set basically all
the permissions, all of the options and the clean manager and we'll run it automatically.
Then it also does kind of deletes temporary stuff that's in temporary folders like
temporary internet files.
This is only this is per user now.
Now bleach bit from what I understand only runs on the list host that it's on or the
user name that it's under this little delete all users, which will pull every single user
and delete like the history and the temp file and the cookies and the recent and the
temporary internet files.
So it will remove all that stuff from all the users and that's kind of what I kind of
liked about my quick clean is that it would do it for all user and not just the user
that you're currently logged into.
So next thing it does is it downloads bit bitch, the latest or 4.0, we'll download that
automatically, run it and it will basically update itself, it will enable all the options
and run it.
Something about this is before it does all that, it will kill, it will download the latest
version of my quick kill script and kill everything that doesn't need to be running on the system.
Now you can customize it if you have a blue screen or want something to run, why you
wouldn't want something to run.
Anyways, if you have a blue screen after quick kill runs, then you know you need to add
some kind of item in there and actually save the log.
So if you do crash, you can see the last couple of executables that got killed before you
got a blue screen, but I've run it on, I don't know, to be different, maybe 20 different
systems and never had a problem with it.
So it kills everything that's not running.
Now the thing about Windows, unlike Linux Unix, you can delete a file while it's in use
for the most part.
Windows will lock, often lock files, even just for if they're being read.
Now if they open them up to read right, obviously they're going to be blocked too.
So when you use quick kill along with bleach bit and my cleaner scripts, it will kill everything
that's not needed and then that way it's able to clean up after all the tent files that
all these things have laid around.
I would say on a system that's never run it before, it would take about, I want to say
like 30, not 30 minutes, up to 30 minutes, maybe 5 to 10 minutes on average.
If you've never run it and I'm able to use your system before, it can take as little
as 2 or 3 minutes on a solid state drive or whatever.
Anyways, that's enough of my cool cleaner script bleach bit quick kill.
Bloodhound Portable is a script that I created to automatically run Bloodhound and collect
all the stuff for kind of blue team or Pintesty stuff.
I do have a static zip file with all the binaries in here, but I released this bad script
just to make everything less complicated because Neo4j is overly complicated to install
and or get running with this whole setup and it's really only one line of code to get it to run.
Having the right job of version and having the right one liner and including all these,
whatever, it's just silly.
The whole process that Bloodhound tells you to do is just like all this for no reason.
Anyways, it will run all this stuff and do all this cool stuff for you and it's just an example
of how to run Portable Bloodhound, which takes way too long to set up.
Blue team Portable uses Runs Lowkey and kind of an IOC and some other stuff.
That one kind of got depreciated anyways.
Runs Lowkey and it also runs something else.
I think that's pretty much it actually.
Shockley Sigmund, this is what that's a script that I run on new Windows machines.
It will first off kind of deep-loop.
It will run all the deep-loop scripts that I've been able to find for Windows,
never having issues.
It will install Shockley D and it will install a bunch of different or a few different things.
No pad plus plus, I have a view and you can customize this but everyone obviously.
And then it will download Sigmund Portable, which I use a lot too on different systems.
Shockley, PsychoVPN tunnels.
I've got my stuff coming.
I'm going to try to go through this in a few more.
But it does test tunnel.
So if you've ever had to, this is for VPN stuff and Cisco VPN and this can work for any VPN client.
In Windows, you can actually change your gateway if you have the rights to do so.
Now, strangely enough, normal users do not have network operators group for some security reasons,
which makes sense.
If you're a user and you can change the direction your packets go, that's kind of a security issue.
By the internet is now, you basically do have network operators, but not at the level that you
would want to.
Anyways, this script will back up your current gateway and set it to whatever you want your new
gateway to be.
And then when you toggle it off, it will flip back to the old gateway and there's some stuff in
there like cleaning cash and whatever.
This is basically if you're on site somewhere and they have a, you want to kind of essentially
split tunnel with a VPN, you can do that without actually having that capability.
So all of these VPN clients will tunnel all your traffic over the VPN with this particular setup.
If they allow you to basically send packets that way, then it will work.
You can, however, run this script and it won't actually do anything because the way the VPN
is set up is that it for whatever reason somehow is able to block that traffic.
So I've had, I've run it sometimes before and it doesn't actually, my current,
I think my current VPN setup, it doesn't let me actually do that.
Even though you can change the default gateway and change the default route,
it doesn't actually work for some reasons unknown.
It may be just like a metric, a metric meaning which system or which interface to use in what order.
Anyways, that doesn't seem to work all the time, but it still might be useful.
dump windows info back, that's really cool.
It will pull the x info, the xdiag info, battery info, and ms info and pull it all on one two
different files and give you some information about your system.
Jetsy client, installs Jetsy client, automatically runs it.
Process mitigation, I think I pulled this from somewhere.
This is a bunch of stuff for security, whatever, that's not super interesting.
Star pound, I've already talked about that.
This is, yeah, we'll run star pound.
So you Windows hardening Diplo is my way, my combination of three different scripts,
three or four different scripts that do Diplo and security stuff hardening.
That's a PowerShell script, so that should actually be in PowerShell scripts.
Windows packet capture is a kind of a cracker jack way to create a TCP dump,
downloading a very small, very small binary that's called the ETL to pcap bingy,
which will kind of make a uses Windows 10 or Windows default packet capture,
and then converts that to a pcap font that you can open in something like Wireshark.
Another really cool one is YouTube BL, FFNPEG, RSC2,
updated or downloaded, I bet.
It's not using YouTube BL anymore because it just recently got deferred or whatever.
So now it's ytd-something, anyways, yt-dlp instead of YouTube BL.
So it's more of that, that's a pretty cool script.
You give it a list of files or of media you want to download,
and not only will it multiply through downloading it,
it will multiply through it, download it, and download everything on the list of ones.
So YouTube BL or YouTube dash, sorry, yt-dlp will download a list,
but it won't download a list all at once.
It will only download one file, one media think type at a time.
You can tell it's a multi-thread, which means it's called swarm downloading
or multi-thread downing.
If you've ever done a torrent, that's essentially what you're doing
is you're swarm downloading something multithreaded.
So with this, you can give it a list of, say, 15 different websites
with 15 different media files on them each,
and it will download all of those essentially at once.
Not necessarily at once, it has a timer of 30 seconds
to actually wait for that file to start to download,
and then it kind of checks, and you can skip the timer or whatever.
But anyways, if you want to download lots of content extremely fast from YouTube
or wherever you can use that, it's a great script, he's a lot.
What I would say, there's also a script that's called,
or there's a plugin that's called, both media downloader and turbo download manager.
Those are actually pretty cool too.
Turbo download manager and both media downloader will kind of like a packet sniffer
for your prone browser.
And it will get you those media URLs.
You can copy and paste them into, at mass, into your downloader.
So pretty cool, there's some other things you can do
to bypass authentication based media, you can run it through a proxy,
through something like Burp Suite, and Burp Suite will keep all your cookie sessions and stuff,
and you can just feed that and say, okay, I want you to use Burp Suite.
I want you to use YouTube downloader, but I want you to proxy it through Burp Suite,
so Burp Suite can handle all the authentication for me.
So you grab your authentication cookies from Burp Suite,
and then run YouTube BL through Burp Suite, and you'll have your authentication.
So that's a fun, fun little project that I've been
poking around with a fair amount.
I think that's pretty much it for Windows, fortunately.
Clean manager, it's the same thing.
It just runs Clean Manager, it's a lighter version of,
bleach bit, quick kill again, it's quick kill,
kills a bunch of stuff.
That's it for Windows.
Thank God.
Let's see what else we got.
The batch script went over, so that was Linux stuff,
thread hunting, JavaScript that went over,
went in PowerShell.
I've got some more or less PowerShell notes.
There's not a super interesting folder.
It's not super interesting.
There's some tracking stuff I can, you can disable
with PowerShell scripts, wake on LAN,
all written in PowerShell.
That's actually kind of cool.
That allows you to turn on a computer when it's off.
Basically how TVs don't turn off now.
Computers don't really turn off either.
And then the notes is just a bunch of random notes
with my awful PowerShell.
The other one in scripts following
is just kind of closing out the scripts folder.
The rest should be down here.
Food.Text is from my actual website
and I ported it over to GitHub
so that it can be more accessible
and I can update it and put better notes in there, whatever.
So that's it for the scripts folder.
The other things in here are
cross-stake real-time response PowerShell scripts.
Actually some of these are just generic PowerShell scripts
that you can use anywhere.
Some of them are specific to different things.
Like clean all users.
There's a crowd-strike PS Falcon thing
that will run and do stuff offline.
There's a recon script
which is actually kind of useful.
There's a forced delete
which will take ownership of files
running a system
and will take ownership of them
so you can actually delete them.
There's some WebNab stuff.
There's the pcapting.
So that one's kind of cool
if you're like doing IRR incident response stuff.
These are some of these PowerShell scripts are for useful.
That's it for that folder.
You got a Python folder,
cross-strike hide, which hides systems
that haven't duplicates
and that don't kind of exist
or haven't been phoning in right.
Gone Fishing was a work in progress.
We're going to talk about that one.
I'm in the Python folder.
Minecast URL protection.
That's kind of cool.
If you're a minecast person,
if you're a minecast user at your company,
this will allow you to scan any URL
using minecast protection API.
Did I kind of handicap route?
Sweet Brown is also another project
that kind of the work in progress
that was supposed to dump a daily,
kind of a daily digest of all the chat.
Different chat clients and Twitter's and mumbles
and all that stuff into one single HTML document
and you can review every day.
That's it for Python, Xplain folders.
Got a bunch of Xplain stuff in there
that I started to go down,
a tangent with,
haven't messed with it in four months.
So there's some ideas in here
that are really cool.
If anybody wants to reach out to me
for Xplain Automations,
scripting, plugins,
let me know.
I tried to get into the vatsn scene
and I wasn't able to pass any of the tests
and I just don't have enough time for it.
And it seemed fun to do at the time,
but then anything I get obsessed
was something for about two weeks
and then I move on.
So this is a really cool links in here
about different plugins for Xplain,
which is a flight simulator.
It's been around for ages
and they had a vatsn,
which is a virtual simulator
for air traffic control.
So they're all serious about everything.
And it's fun stuff to be involved in
for however little I was.
A SIGWIN portable installer,
which is what get referenced
in the SIGWIN chocolatey script that I use,
which will automatically download SIGWIN
and install all the fun stuff,
bash func in a bunch of other cool things.
Digger was a script I originally wrote
for if you have people
that are Karma Black response,
they're Cloud APIs,
wildfire, if you've done any wildfire API key stuff.
And Karma Black response stuff,
that's under the Digger folder.
Portable blue team that kind of fell apart
because I realized that nobody uses Yara
or not Yara, nobody uses,
what's the name of this app?
It's like a recall, R-E-K-A-L.
Not a whole lot of people use it
and it's kind of getting depreciated.
So there's things like,
and I could do a podcast on this,
which is not super interesting.
There's a work in progress for a kind of
an open source Yara kind of tool.
It's called blue,
blue something, blue snarf, blue purple,
blue smurf or whatever.
That's kind of interesting.
Lane DNMAP has basically distributed DNMAP
where you can, you know,
set it as a key up on a bunch of servers
and perform scans and kind of a batch capacity
so you can scan a bunch of systems
all at once with DNMAP.
I think that's pretty much it.
Thank God for GitHub.
And I wanna say the only other really updates I have,
and this is a year's worth of stuff.
So bear with me.
It's pretty much it.
Bert Portable got updated.
That's on my actual website.
I don't put that on GitHub
because I don't necessarily,
it's not necessarily legit
per se proxy stuff.
Not really much anything useful here.
That's pretty much it.
Anyways, that's a dump of all my interesting stuff.
It looks like my movies file doesn't actually work right now.
Their API goes up and down.
So I'm gonna say,
I have accomplished this Flickch metrics task
and I'm going to let you all go and stop rambling.
I'll have a link to my GitHub.
It's pretty standard.
Just I know the script's folder should be everything
and you should be good.
You've been listening to Hecker Public Radio
at HeckerPublicRadio.org.
Today's show was contributed by an HBR listener like yourself.
If you ever thought of recording a podcast,
then click on our contribute link
to find out how easy it really is.
Hosting for HBR is kindly provided by an honesthost.com.
The internet archive and our sync.net.
Unless otherwise stated,
today's show is released under Creative Commons,
Attribution, ShareLike3.0 license.