Skip to content

Instantly share code, notes, and snippets.

Julian C. Dunn juliandunn

Block or report user

Report or block juliandunn

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@juliandunn
juliandunn / micros-pos-example.rb
Created Sep 14, 2018
Example, untested InSpec code for evaluating Micros POS systems against CVE-2018-2636
View micros-pos-example.rb
# Original Python: https://raw.githubusercontent.com/erpscanteam/CVE-2018-2636/master/eGw.py
control 'Check Micros POS for CVE-2018-2636' do
impact 1.0
title 'Check whether your Micros POS is vulnerable to CVE-2018-2636'
desc 'CVE-2018-2636 is a remote-execution vulnerability that gives unauthenticated attackers unrestricted access to the POS system.'
describe http('http://micros.example.com:8080/EGateway/EGateway.asmx',
headers: {'Content-Type' => 'application/dime',
'SOAPAction' => '"http://micros-hosting.com/EGateway/ProcessDimeRequest"',
View graph_profile.out
This file has been truncated, but you can view the full file.
Measure Mode: wall_time
Thread ID: 70311047589620
Fiber ID: 70311054514500
Total Time: 42.438698053359985
Sort by: total_time
%total %self total self wait child calls name
--------------------------------------------------------------------------------
100.00% 0.00% 42.439 0.000 0.000 42.439 1 Chef::Client#run
View KittenRandomController.cs
using System.Collections;
using System.Collections.Generic;
using UnityEngine;
public class KittenRandomController : MonoBehaviour {
public float speed;
private int frameupdaterate; // only change the kitten velocity every FrameUpdateRate frames
private float framecounter = 0;
@juliandunn
juliandunn / my.cnf
Created Jun 30, 2016
default my.cnf inside the mysql container
View my.cnf
# cat my.cnf
# Copyright (c) 2014, 2015, Oracle and/or its affiliates. All rights reserved.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; version 2 of the License.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
View fedora-24.ks.cfg
install
cdrom
lang en_US.UTF-8
keyboard us
network --bootproto=dhcp
rootpw abc123
firewall --disabled
authconfig --enableshadow --passalgo=sha512
selinux --enforcing
timezone UTC
@juliandunn
juliandunn / main.rs
Created Dec 2, 2015
Christmas card 2015
View main.rs
use
std::io
; fn
main()
{
let
mut a =
String::new()
; io::stdin()
.read_line(&mut a)
View chef-datasheet-rev2.md

[1] The Chef Architecture and Workflow

(Roberta: We could also express this as a set of numbered bullet points if that is clearer)

Chef is a client-server architecture. Infrastructure code is entered into one or more recipes, which then live inside a cookbook. Cookbooks are uploaded to a Chef server manually, or more commonly, as part of a code delivery pipeline. The systems under management are called nodes

View windows-instance-data-winrm.ps1
<powershell>
#####
#DON'T FORGET TO SET/CHANGE THE USERNAME/PASSWORD BELOW!
#####
$user="chef"
$password="chef"
# Disable password complexity requirements
View bootstrap-gist.txt
~$ knife bootstrap 172.29.150.106 -t /Users/juliandunn/devel/gh/juliandunn/chef/lib/chef/knife/bootstrap/templates/chef-full.erb -x u0015280 --sudo -N l5a1vp008_pub
Please report a bug if this causes problems.
Creating new client for l5a1vp008_pub
Creating new node for l5a1vp008_pub
Connecting to 172.29.150.106
u0015280@172.29.150.106's password:
172.29.150.106 -----> Installing Chef Omnibus (-v 12)
172.29.150.106 downloading https://www.opscode.com/chef/install.sh
172.29.150.106 to file /tmp/install.sh.11599984/install.sh
172.29.150.106 trying perl...
View telegram.agi
#!/usr/bin/env perl
use warnings;
use strict;
use Encode qw(decode encode);
use POSIX qw(strftime);
use Text::Wrap;
$| = 1;
You can’t perform that action at this time.