You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function nothingToDoHere($newLine = '<br>'){ | |
return ' | |
──────█▀▄─▄▀▄─▀█▀─█─█─▀─█▀▄─▄▀▀▀─────'.$newLine.' | |
──────█─█─█─█──█──█▀█─█─█─█─█─▀█─────'.$newLine.' | |
──────▀─▀──▀───▀──▀─▀─▀─▀─▀──▀▀──────'.$newLine.' | |
─────────────────────────────────────'.$newLine.' | |
───────────────▀█▀─▄▀▄───────────────'.$newLine.' | |
────────────────█──█─█───────────────'.$newLine.' | |
────────────────▀───▀────────────────'.$newLine.' | |
─────────────────────────────────────'.$newLine.' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta charset="utf-8"> | |
<title>Apple Meta Insanity</title> | |
<!-- | |
APPLE WEB APP META TAGS | |
--> | |
ამ ბოლო დროს მეგობრებს ღამეები აღარ გვძინავს და ვმუშაობდით ხელოვნური ინტელექტის ერთ გიკროსტიკურტ პროეტზე რომლის ფარგლებშიც შევქმენით ეს bookmarklet * ის დაგეხმარებათ ნებისმიერ კითხვაზე იპოვოთ პასუხი :3
javascript:var _a = document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))
ps. თუ არ იცით რაარის bookmarklet და გაინტერესებთ დააწექით F12 შემდეგ გადადით კონსოლში და ჩაწერეთ ეს :
document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
" ---------------------- USABILITY CONFIGURATION ---------------------- | |
" Basic and pretty much needed settings to provide a solid base for | |
" source code editting | |
" don't make vim compatible with vi | |
set nocompatible | |
" turn on syntax highlighting | |
syntax on | |
" and show line numbers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import urllib,urllib2,cookielib | |
cookie_jar = cookielib.CookieJar() | |
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cookie_jar)) | |
urllib2.install_opener(opener) | |
url_1 = 'http://www.magtifun.ge/index.php?page=11&lang=ge' | |
values = dict(password='Password', user='User', act='1') | |
data = urllib.urlencode(values) | |
req = urllib2.Request(url_1, data) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
source: http://www.markbrilman.nl/2011/08/howto-convert-a-pfx-to-a-seperate-key-crt-file/ | |
`openssl pkcs12 -in [yourfile.pfx] -nocerts -out [keyfile-encrypted.key]` | |
What this command does is extract the private key from the .pfx file. Once entered you need to type in the importpassword of the .pfx file. This is the password that you used to protect your keypair when you created your .pfx file. If you cannot remember it anymore you can just throw your .pfx file away, cause you won’t be able to import it again, anywhere!. Once you entered the import password OpenSSL requests you to type in another password, twice!. This new password will protect your .key file. | |
Now let’s extract the certificate: | |
`openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out [certificate.crt]` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// I needed flatuicolors.com as Sass variables... | |
// In your console, run: | |
$('.color').get().map(function(el) { return "$" + el.classList[1] + ": " + el.getAttribute('data-clipboard-text') + ';' }).join('\r\n'); | |
// Output: | |
// $turquoise: #1abc9c; | |
// $emerland: #2ecc71; | |
// $peter-river: #3498db; | |
// $amethyst: #9b59b6; | |
// $wet-asphalt: #34495e; |
NewerOlder