- Change password (default password: default_admin_passwords)
- Change user (default user: esonhugh)
- Change ingress host name to your team server
- Deploy it!
kubectl apply -f deployment-service.yaml -f ingress.yaml -f configmap.yaml # -n <change namespace you deploy>
- use
pipx install git+https://github.com/exploide/bloodhound-cli.git
- Disable or uninstall the official
C/C++ plugin
. - Install the
clangd
plugin. - Build the kernel with
clang
:
/path/to/kernel_source$ make CC=clang defconfig
/path/to/kernel_source$ make CC=clang -j16
- Generate the
compile_commands.json
:
/path/to/kernel_source$ python ./scripts/clang-tools/gen_compile_commands.py
I encountered a situation where the target running PAN-OS was vulnerable to CVE-2017-15944 but I was unable to exploit it using Metasploit.
One of the techniques of exploiting CVE-2017-15944 exploit, is to create a file under /opt/pancfg/mgmt/logdb/traffic/1/* which gets processed by the cron job (/etc/cron.d/indexgen -> /usr/local/bin/genindex_batch.sh). Metasploit uses this technique.
The article at https://tinyhack.com/2019/01/10/alternative-way-to-exploit-cve-2017-15944-on-pan-os-6-1-0/ mentions that it might be impossible to exploit CVE-2017-15944 as the script is already running. The article mentions that the cron job (/etc/cron.d/core_compress -> /usr/local/bin/core_compress) is also vulnerable to command injection.
# Cloudflare Dynamic DNS update script | |
# Required policy: read, write, test, policy | |
# Add this script to scheduler | |
# Install DigiCert root CA or disable check-certificate | |
# Configuration --------------------------------------------------------------------- | |
:local TOKEN "__APITOKEN__" | |
:local ZONEID "__ZONEIDENTIFIER__" | |
:local RECORDID "__RECORDIDENTIFIER__" | |
:local RECORDNAME "__DNSRECORD__" |
sudo pacman -Syu zsh
You do not need to install manjaro-zsh-config
and all the other related packages like zsh-syntax-highlighting
, zsh-history-substring-search
, zsh-autosuggestions
, etc., as we will use Oh My Zsh.
sudo pacman -S gdb
sudo pacman -S pwndbg
echo 'source /usr/share/pwndbg/gdbinit.py' >> ~/.gdbinit
If you are getting the following error "Cannot find Pwndbg virtualenv directory: /usr/share/pwndbg/.venv: please re-run setup.sh", do the following steps, otherwise ignore:
# Android Debug Bridge (adb) interactive shell should be used to change these settings. | |
# Since the 'settings' shell command only exists on Android 4.2 or newer versions of Android, even if the SettingsProvider has the key/value pairs, there is no way for legacy OS prior to Android 4.2 to change these with the command specified in this shell snippet. | |
# See https://android.googlesource.com/platform/frameworks/base/+/master/core/java/android/provider/Settings.java for latest SettingsProvider key/value pairs. | |
# See https://android.googlesource.com/platform/frameworks/base/+/refs/tags/android-$(Android_Version_Code)_r$(Android_Version_Revision_Code)/core/java/android/provider/Settings.java for SettingsProvider key/value pairs for a specific version of Android. Android Version Code and Android Version Revision Code could be found at https://android.googlesource.com/platform/frameworks/base/+refs . | |
# Specifies the device's UTC system clock and date should be set automatically from sources like NITZ, GNSS or NTP. |
国内从 Docker Hub 拉取镜像有时会遇到困难,此时可以配置镜像加速器。
Dockerized 实践 https://github.com/y0ngb1n/dockerized
Portable Version KEYS: | |
P6Z3T-UYJC9-YAK3F-APN9M-6ZDSD | |
FGZPK-93CWX-Q33Y6-D5URV-YXC3X | |
9CZQX-9YAQA-PF33L-XVUQH-NSD48 | |
8RZ3L-H3Y5L-W2RY5-Z5M8N-C7Z2U | |
CCZNU-LW3LF-K9V2T-MYZFF-94667 | |
EWZM6-3W4UX-KH922-C96GK-VGBH2 | |
Standard Version KEYS: | |
4AZNW-S2YHE-LLMWM-J6EL8-7QKDL |