Skip to content

Instantly share code, notes, and snippets.

@corest
corest / explanation.md
Last active October 24, 2024 18:45
pod1.json - go-http2-client

Network policy for pod1 - go-http2-client:

apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: go-http2-client # unique name
  namespace: ks-load # same namespace as targeted pod
spec:
  podSelector: # one or multiple labels, used to find targeted pods (pods which this policy will affect)
Introduction and Background
Personal Experience and Background
How did you get started in penetration testing?
What has been your most challenging and rewarding penetration test?
Preparation and Reconnaissance
Initial Research and Reconnaissance
What are the first steps you take when you learn the company name?
What sources do you use for passive reconnaissance (e.g., OSINT tools, search engines, social media)?
Do you have any favorite tools or techniques for gathering information about the target?
Plan for Analyzing Web Applications for Remote Code Execution (RCE) Vulnerabilities
Step 1: Reconnaissance
Objective: Gather as much information as possible about the target application and its environment.
Tools:
Nmap: For network scanning and service discovery.
Whois: To gather information about domain registration.
Sublist3r: To enumerate subdomains.
Wappalyzer: To identify technologies used by the web application.
Actions:
Conduct a thorough scan using Nmap to identify open ports and services running on the target server.
apiVersion: v1
kind: Namespace
metadata:
name: ks-load-host-pod
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: server
namespace: ks-load-host-pod
@corest
corest / keycloak.md
Created June 27, 2022 16:15
Keycloak user update

API endpoint to retrieve user token:

https://keycloak.dev.veego.mgmnt.rmnkiba.local//realms/veego/protocol/openid-connect/token

To get the token, you need to pass Client ID and Client Secret like this:

package main
import (
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"strings"
"time"
Repository: giantswarm/kubernetesd has 884 tags.
Repository: giantswarm/aws-operator has 10738 tags.
Repository: giantswarm/cert-operator has 673 tags.
Repository: giantswarm/kvm-operator has 3142 tags.
Repository: giantswarm/happa has 6595 tags.
Repository: giantswarm/api-spec has 684 tags.
Repository: giantswarm/k8s-kvm has 207 tags.
Repository: giantswarm/mayu has 138 tags.
Repository: giantswarm/docs has 1306 tags.
Repository: giantswarm/draughtsman has 260 tags.
Repository: giantswarm/kubernetesd has 884 tags.
Repository: giantswarm/aws-operator has 10738 tags.
Repository: giantswarm/cert-operator has 673 tags.
Repository: giantswarm/kvm-operator has 3142 tags.
Repository: giantswarm/happa has 6595 tags.
Repository: giantswarm/k8s-endpoint-updater has 62 tags.
Repository: giantswarm/k8s-bridge-ip-configmap has 1 tags.
Repository: giantswarm/web-assets has 79 tags.
Repository: giantswarm/k8s-network-config has 2 tags.
Repository: giantswarm/k8s-network-iptables has 1 tags.
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: awsclusterconfigs.core.giantswarm.io
spec:
conversion:
strategy: None
group: core.giantswarm.io
names:
@corest
corest / awsclusters.infrastructure.giantswarm.io.yaml
Created March 13, 2020 13:05
AWS CRs to create giantswarm cluster 11.0.1
# capi control-plane aws
apiVersion: infrastructure.giantswarm.io/v1alpha2
kind: AWSCluster
metadata:
generation: 1
labels:
aws-operator.giantswarm.io/version: 8.1.1
giantswarm.io/cluster: nzr5z
giantswarm.io/organization: giantswarm
release.giantswarm.io/version: 11.0.1