I hereby claim:
- I am detrojones on github.
- I am detro (https://keybase.io/detro) on keybase.
- I have a public key whose fingerprint is 126A D98A 1F40 162E D4D0 25AF 0388 A97B 5F87 4A3D
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python | |
# | |
# usage: | |
# conv2vmx-ovf.py some-vm.ovf | |
# | |
# ref: http://www.cnblogs.com/eshizhan/p/3332020.html | |
# | |
import sys | |
fn = sys.argv[1] |
Prerequisites:
Software components used:
#!/usr/bin/python | |
""" | |
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya | |
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by | |
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()' | |
in libtalloc does not write a value on 'creds' address. | |
Reference: | |
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ |
#include <stdlib.h> | |
#include <unistd.h> | |
#include <stdbool.h> | |
#include <stdio.h> | |
#include <signal.h> | |
#include <err.h> | |
#include <string.h> | |
#include <alloca.h> | |
#include <limits.h> | |
#include <sys/inotify.h> |
#define _GNU_SOURCE | |
#include <stdio.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <fcntl.h> | |
#include <signal.h> | |
#include <elf.h> | |
#include <err.h> | |
#include <syslog.h> | |
#include <sched.h> |
local shortport = require "shortport" | |
local stdnse = require "stdnse" | |
description = [[ | |
Detects whether the given server is running a WebSocket service on its root | |
directory. | |
]] | |
--- | |
-- @usage |