- Use an existing ISO or copy from a CD with
dd if=/dev/cdrom of=image.iso
- Qcow disk type
- 40GB Root Disk
- Load your Windows ISO to the Primary CD drive
- Add a secondary CD drive and attach the VirtIO ISO to it
#!/usr/bin/expect -f | |
# This script secures SuperMicro IPMI implementations which are vulnerable | |
# to viewing the IPMI password in plaintext on port 49152. It does this by | |
# using the shell available in some SuperMicro BMCs to drop traffic to port | |
# 49152 in iptables. | |
# | |
# See http://blog.cari.net/carisirt-yet-another-bmc-vulnerability-and-some-added-extras/ | |
# for more details on the vulnerability. | |
# |
# hubot | |
description "Hubot Campfire bot" | |
author "David Wittman <david@wittman.com>" | |
start on filesystem or runlevel [2345] | |
stop on runlevel [!2345] | |
# Path to Hubot installation | |
env HUBOT_DIR='/opt/hubot/' |
description = [[ | |
Issues an arbitrary HTTP GET request | |
]] | |
--- | |
-- @usage | |
-- nmap --script http-get [--script-args http-get.path=/status] -p <port> <host> | |
-- @args http-get.path The path to request (defaults to /) | |
-- http-get.match String to match in the HTTP response (incl. headers) | |
-- @output |
#!/usr/bin/env python | |
# check_peer_interfaces.py | |
# Author: David Wittman <david@wittman.com> | |
# | |
# Checks to see if two interfaces are on the same network by sending a | |
# unique broadcast packet out of the first interface and listening for that | |
# packet on the second interface. | |
# | |
# Assumes that you're running a Linux variant, and that both interfaces |
#!/usr/bin/env python | |
# Converts Ansible dynamic inventory sources to static files | |
# Input is received via stdin from the dynamic inventory file | |
# ex: | |
# ec2.py --list | ansible-dynamic-inventory-converter.py | |
import json | |
import os | |
import sys |
#!/usr/bin/env bash | |
if [[ $# -ne 1 ]]; then | |
echo "Merge matching *.part files in a directory" | |
echo | |
echo "usage: $0 <directory>" | |
exit 1 | |
fi | |
DIRECTORY="$1" |
#!/usr/bin/env python | |
""" | |
MS12-020/CVE-2012-0002 Vulnerability Tester | |
based on sleepya's version @ http://pastebin.com/Ks2PhKb4 | |
""" | |
import socket | |
import struct | |
import sys |
dd if=/dev/cdrom of=image.iso
#!/usr/bin/env python | |
import json | |
import os | |
import time | |
import clouddns | |
USERNAME = '' | |
APIKEY = '' |
For some reason or another, I'm always second guessing myself when writing nested list comprehensions. Here's a quick example to clarify what's going behind the scenes:
>>> words = ["foo", "bar", "baz"]
>>> [letter for word in words for letter in word]
['f', 'o', 'o', 'b', 'a', 'r', 'b', 'a', 'z']