Skip to content

Instantly share code, notes, and snippets.

#!/bin/sh
sudo yum -y update
sudo yum -y install firewalld
sudo yum -y install kernel-devel-$(uname -r)
sudo yum -y localinstall http://packetfence.org/downloads/PacketFence/RHEL8/packetfence-release-11.1.el8.noarch.rpm
sudo yum -y install --enablerepo=packetfence packetfence
setspn -A HTTP/hisashiakamai.login.go.akamai-access.com@MINAMINA.LOCAL hisashiyamaguchi
ktpass /out hisashiyamaguchi.keytab /princ HTTP/hisashiakamai.login.go.akamai-access.com@MINAMINA.LOCAL /mapuser minamina@MINAMINA.LOCAL /pass "xxxx!" /crypto All /ptype KRB5_NT_PRINCIPAL
{
"device_posture_signals": "https://signal.dps.akamai-access.com/",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"client_secret_jwt"
],
"code_challenge_methods_supported": [
"plain",
"S256"
<samlp:Response
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
ID="_39FDCB1F1BCF120098E89A4750374BB7"
InResponseTo="_077d996f-6b37-4172-8492-ae1d415596e8"
Version="2.0"
IssueInstant="2021-09-16T00:44:00Z"
Destination="https://login.microsoftonline.com/login.srf">
<saml:Issuer>https://login.akamaidemo.net/saml/idp/sso</saml:Issuer>
<Signature
#
# Recommended minimum configuration:
#
# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
<?xml
version="1.0"
encoding="UTF-8"?>
<saml2p:Response
Destination="https://nriokta.login.go.akamai-access.com/saml/sp/response"
ID="id1663368879221708679411174"
InResponseTo="_D86B5A6619EEAF442EA0B21EBBC48BA1"
IssueInstant="2021-09-07T01:04:56.721Z"
Version="2.0"
xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
[2021-08-24 10:16:24.039] [engineer@localhost akamai]$ cat test2021080301-02.json | http --verbose -A eddgegrid --debug -a ****: POST :/etp-report/v3/configs/****/dns-activities/details
[2021-08-24 10:16:53.253] >>> requests.request(**{'auth': <httpie_edgegrid.HTTPieEdgeGridAuth object at 0x7f2782b22ac8>,
[2021-08-24 10:16:53.253] 'data': b'{\r\n\t"startTimeSec": 1627920000,\r\n\t "endTimeSec": 1627'
[2021-08-24 10:16:53.253] b'923599,\r\n\t\t "orderBy": "ASC",\r\n\t\t "pageNumber": 1,'
[2021-08-24 10:16:53.253] b'\r\n\t\t\t "pageSize": 50,\r\n\t\t\t "filters": {}\r\n'
[2021-08-24 10:16:53.253] b'}\r\n',
[2021-08-24 10:16:53.253] 'headers': {'User-Agent': b'HTTPie/2.4.0', 'Accept': b'application/json, */*;q=0.5', 'Content-Type': b'application/json'},
[2021-08-24 10:16:53.253] 'method': 'post',
[2021-08-24 10:16:53.253] 'params': <generator object MultiValueOrderedDict.items at 0x7f27803f3570>,
[2021-08-24 10:16:53.253] 'url': 'http://localhost/etp-re
#!/bin/sh
# The script has been confirmed to work on Amazon Linux.
# $ uname -r
# 4.14.231-173.361.amzn2.x86_64
sudo yum update
sudo systemctl enable nginx
sudo amazon-linux-extras enable nginx1
sudo yum -y install nginx
#!/bin/sh
while true
do
dig $1
sleep 1
done