Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
function azrdp { | |
<# | |
.Author | |
Trevor Sullivan <pcgeek86@gmail.com> | |
.Description | |
Invoke a RDP session to an Azure Virtual Machine, without having to type the | |
Cloud Service name or Virtual Machine name. | |
.Outputs |
function Dictionary | |
{ | |
param([Type[]]$Type, [Hashtable]$Hashtable) | |
$KeyType = $Type[0] | |
$ValueType = $Type[1] | |
$Dictionary = New-Object -TypeName "System.Collections.Generic.Dictionary[$KeyType,$ValueType]" | |
$Hashtable.GetEnumerator() | % { |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit4 < Msf::Exploit::Remote |
#define _GNU_SOURCE | |
#include <stdio.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <fcntl.h> | |
#include <signal.h> | |
#include <elf.h> | |
#include <err.h> | |
#include <syslog.h> | |
#include <sched.h> |
function Test-MS15034($url) { | |
try { | |
$wr = [Net.WebRequest]::Create($url) | |
$wr.AddRange('bytes',234234,28768768) | |
$res = $wr.GetResponse() | |
$status = $res.statuscode | |
Write-Output "$status means it is not vulnerable" | |
$res.Close() | |
}catch { | |
if ($Error[0].Exception.InnerException.Response.StatusCode -eq '416') {Write-Output "Site is vulnerable"} |
Below code tries to pull commands from Gmail. | |
#function Invoke-PsGcatAgentIMAP | |
#{ | |
[CmdletBinding()] Param( | |
[Parameter(Position = 0, Mandatory = $false)] | |
[String] | |
$Username, |
Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
Add the following chunk to your existing ISC dhcpd.conf
file.
if exists user-class and ( option user-class = "iPXE" ) {
filename "http://boot.smidsrod.lan/boot.ipxe";
}
else {
filename "undionly.kpxe";
}
(or see https://gist.github.com/4008017 for a more elaborate setup
echo -----BEGIN CERTIFICATE----- > encoded.txt | |
echo Just Base64 encode your binary data | |
echo TVoAAA== >> encoded.txt | |
echo -----END CERTIFICATE----- >> encoded.txt | |
certutil -decode encoded.txt decoded.bin |
Database: heroku_1ed5a148e6d9415 | |
Table: black_cards | |
[16 entries] | |
+----+--------------------------------------------------------------------------------------------------------------+ | |
| id | content | | |
+----+--------------------------------------------------------------------------------------------------------------+ | |
| 1 | _____ means never having to say you're sorry. | | |
| 2 | The pen tester found _____ in the trash while dumpster diving. | | |
| 3 | Our CIO has a framed a picture of _____. | | |
| 4 | 9 out of 10 experts agree, _____ will increase your security effectiveness. | |