Skip to content

Instantly share code, notes, and snippets.

View Ne00n's full-sized avatar

Ne00n

  • Location Location Location
View GitHub Profile
@Ne00n
Ne00n / iptables-ddns.sh
Last active August 6, 2022 17:25 — forked from eusonlito/iptables-ddns.sh
Update iptables firewall with dynamic DNS updates from cron job
#!/bin/bash
# Set as cronjob
# * * * * * /root/iptables-ddns.sh >> /var/logs/iptables-ddns.log 2>&1
log () {
echo "[$(date "+%F +%T")] [$1] $2" >> "$LOGS/iptables-ddns.log"
}
HOSTS="mydynamichost.ddns.net"

Step 1. Starting the Rescue System - Linux 64bit

Activating the Rescue System

To start a server in the Rescue System, it needs to be activated in the Robot.

Under "Main Functions; Server" select the desired server and then open the tab "Rescue". Here the desired variant can be activated.

The password that was given to you when you activated the Rescue System can now be used to login as "root" via SSH. Restarting the Server

@Ne00n
Ne00n / ip_in_range.php
Created April 6, 2017 18:58 — forked from tott/ip_in_range.php
php check if IP is in given network range
/**
* Check if a given ip is in a network
* @param string $ip IP to check in IPV4 format eg. 127.0.0.1
* @param string $range IP/CIDR netmask eg. 127.0.0.0/24, also 127.0.0.1 is accepted and /32 assumed
* @return boolean true if the ip is in this range / false if not.
*/
function ip_in_range( $ip, $range ) {
if ( strpos( $range, '/' ) == false ) {
$range .= '/32';
}
@Ne00n
Ne00n / .md
Last active September 29, 2016 17:06 — forked from joepie91/.md

ANSSI

  • December 3, 2013: Google finds fraudulent certificates for Google domains, signed by ANSII. The certificates are used for MITM attacks. (source)

CNNIC

  • March 3, 2015: An intermediate CA operating under CNNIC (named MCS Holdings) is found issuing fraudulent certificates for various Google domains, for the purpose of MITM attacks. This delegation should have never occurred, as MCS Holdings was not fit to hold this kind of authority. (source)

Comodo