Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
public enum Order | |
{ | |
Ascending, | |
Descending | |
} |
using System; | |
using System.Collections; | |
using System.Configuration; | |
using System.Reflection; | |
using System.Web; | |
[assembly: PreApplicationStartMethod(typeof(EnvSettings.SettingsProcessor), "Start")] | |
namespace EnvSettings | |
{ |
Windows Registry Editor Version 5.00 | |
[HKEY_CURRENT_USER\Console] | |
"ColorTable00"=dword:000c0c0c | |
"ColorTable01"=dword:00da3700 | |
"ColorTable02"=dword:000ea113 | |
"ColorTable03"=dword:00dd963a | |
"ColorTable04"=dword:001f0fc5 | |
"ColorTable05"=dword:00981788 | |
"ColorTable06"=dword:00009cc1 |
# WSL2 network port forwarding script v1 | |
# for enable script, 'Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser' in Powershell, | |
# for delete exist rules and ports use 'delete' as parameter, for show ports use 'list' as parameter. | |
# written by Daehyuk Ahn, Aug-1-2020 | |
# Display all portproxy information | |
If ($Args[0] -eq "list") { | |
netsh interface portproxy show v4tov4; | |
exit; | |
} |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log