I hereby claim:
- I am azet on github.
- I am azet (https://keybase.io/azet) on keybase.
- I have a public key whose fingerprint is 7CB6 197E 385A 02DC 15D8 E223 E4DB 6492 FDB9 B5D5
To claim this, I am signing this object:
16:03:58.075728 IP (tos 0x0, ttl 64, id 1424, offset 0, flags [DF], proto TCP (6), length 52) | |
localhost.5666 > localhost.54453: Flags [.], cksum 0xee83 (correct), seq 1, ack 1037, win 545, options [nop,nop,TS val 254913063 ecr 254913063], length 0 | |
0x0000: 4500 0034 0590 4000 4006 3732 7f00 0001 E..4..@.@.72.... | |
0x0010: 7f00 0001 1622 d4b5 ea35 afb6 a38f ed10 ....."...5...... | |
0x0020: 8010 0221 ee83 0000 0101 080a 0f31 aa27 ...!.........1.' | |
0x0030: 0f31 aa27 .1.' | |
16:03:58.077265 IP (tos 0x0, ttl 64, id 1425, offset 0, flags [DF], proto TCP (6), length 1088) | |
localhost.5666 > localhost.54453: Flags [P.], cksum 0x0235 (incorrect -> 0xc7da), seq 1:1037, ack 1037, win 545, options [nop,nop,TS val 254913064 ecr 254913063], length 1036 | |
0x0000: 4500 0440 0591 4000 4006 3325 7f00 0001 E..@..@.@.3%.... | |
0x0010: 7f00 0001 1622 d4b5 ea35 afb6 a38f ed10 ....."...5...... |
Return-Path: <azet@azet.org> | |
Received: from [10.60.20.43] ([193.170.94.254]) | |
by mx.google.com with ESMTPSA id f45sm8725929eeg.5.2014.02.13.08.32.23 | |
for <multiple recipients> | |
(version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); | |
Thu, 13 Feb 2014 08:32:24 -0800 (PST) | |
Message-ID: <52FCF399.7090208@azet.org> | |
Date: Thu, 13 Feb 2014 17:32:25 +0100 | |
From: Aaron Zauner <azet@azet.org> |
find . -iname '*.flac' -exec mkdir -p "converted/{}" \; -exec ffmpeg -i "{}" -q:a 1 "converted/{}.mp3" \; |
azet@silenus ~ % otool -L `which curl` | |
/usr/bin/curl: | |
/usr/lib/libcurl.4.dylib (compatibility version 7.0.0, current version 8.0.0) | |
/usr/lib/libz.1.dylib (compatibility version 1.0.0, current version 1.2.5) | |
/usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current version 1197.1.1) | |
azet@silenus ~ % sudo dtruss "curl https://imperialviolet.org:1266" &> dtruss_curl | |
azet@silenus ~ % grep -i 'crypto\|security' dtruss_curl | |
stat64("/System/Library/Frameworks/Security.framework/Versions/A/Security\0", 0x7FFF56BAF088, 0x7FFF56BAFF20) = 0 0 | |
stat64("/usr/lib/system/libcorecrypto.dylib\0", 0x7FFF56BAEE98, 0x7FFF56BAFD30) = 0 0 | |
stat64("/usr/lib/system/libcommonCrypto.dylib\0", 0x7FFF56BAEA08, 0x7FFF56BAF8A0) = 0 0 |
#!/usr/bin/env bash | |
sshuser="meister" | |
iodinepwd="pwdpwd" | |
iodinehost="dnsfakepool.cool.systems" | |
# exit 1 if we're not uid 0 e.g. superuser | |
[ `id -u ` -ne 0 ] && exit 1 |
I hereby claim:
To claim this, I am signing this object:
# additional packages for server vms | |
case $::operatingsystem { | |
'CentOS': { | |
# = package management: | |
# * yum changelog is needed e.g. for yum-security-check.pl | |
# = debugging: | |
# * kexec-tools in case it's needed | |
# * mtr | |
# * sysstat | |
# * perf |
So this happened: phrack changed it's format and posted a nice analysis of the | |
(nowadays missing) hacker community and societal behaviour of hackers in | |
general: http://phrack.org/papers/fall_of_groups.html | |
This article reflects a lot of thoughts I've had over the last couple of | |
months. In a very positive way. | |
Yea sure, the scene we grew up in changed to what has now become a bullshit | |
business like any other. Originality is scarce and every time I see SQLi or |
keytool -import -alias foobar -file bla.crt -destkeystore /usr/lib/jvm/java-1.6.0-openjdk-1.6.0.0.x86_64/jre/lib/security/cacerts |
openssl s_server -state -debug -msg -tlsextdebug \ | |
-accept ${port} -cipher ${suite} \ | |
-serverpref -cert cert.pem \ | |
-key key.pem |