System: Debian/Ubuntu/Fedora. Might work for others as well.
As mentioned here, to update a go version you will first need to uninstall the original version.
To uninstall, delete the /usr/local/go
directory by:
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
System: Debian/Ubuntu/Fedora. Might work for others as well.
As mentioned here, to update a go version you will first need to uninstall the original version.
To uninstall, delete the /usr/local/go
directory by:
openssl x509 -inform der -in ca.der -out burp.pem | |
name=$(openssl x509 -inform PEM -subject_hash_old -in burp.pem | head -1) | |
cp burp.pem "$name.0" | |
rm burp.pem | |
echo "[~] Run using adb: adb push $name.0 /system/etc/security/cacerts/$name.0" |
# mkdir certificates && cd certificates | |
sudo apt-get install openssl | |
cp /usr/lib/ssl/openssl.cnf ./ | |
openssl req -x509 -days 730 -nodes -newkey rsa:2048 -outform der -keyout server.key -out ca.der -extensions v3_ca -config openssl.cnf | |
openssl rsa -in server.key -inform pem -out server.key.der -outform der | |
openssl pkcs8 -topk8 -in server.key.der -inform der -out server.key.pkcs8.der -outform der -nocrypt | |
rm openssl.cnf | |
rm server.key | |
rm server.key.der |
Exploit/description | Path |
---|---|
Microsoft Office Online Server SSRF (relay) | /op/view.aspx |
CVE-2017-11317 CVE-2019-18935 | /Telerik.Web.Ui.WebResource.axd?type=rau |
CVE-2017-11317 CVE-2019-18935 | /Telerik.Web.UI.DialogHandler.aspx |
CVE-2020-17519 | /jobmanager/logs/ |
CVE-2017-7615 | /verify.php?id=1&confirm_hash= |
CVE-2018-1000130 | /jolokia |
CVE-2018-1000130 | /actuator/jolokia |
leak | /actuator/env |
# Backup | |
docker exec CONTAINER /usr/bin/mysqldump -u root --password=root DATABASE > backup.sql | |
# Restore | |
cat backup.sql | docker exec -i CONTAINER /usr/bin/mysql -u root --password=root DATABASE | |
利用 NGINX 的 Stream 模塊 sni_preread 功能,可以做到讓 Trojan 和其他網站在同一台機器上共享 443 端口。
diff --git a/server/server.vala b/server/server.vala | |
index d3fc39f9..3e4d11b3 100644 | |
--- a/server/server.vala | |
+++ b/server/server.vala | |
@@ -3,7 +3,7 @@ namespace Frida.Server { | |
private const string DEFAULT_LISTEN_ADDRESS = "127.0.0.1"; | |
private const uint16 DEFAULT_LISTEN_PORT = 27042; | |
- private const string DEFAULT_DIRECTORY = "re.frida.server"; | |
+ private const string DEFAULT_DIRECTORY = "re.freeda.server"; |