Skip to content

Instantly share code, notes, and snippets.

View msoe's full-sized avatar

Minn Myat Soe msoe

View GitHub Profile

Keybase proof

I hereby claim:

  • I am msoe on github.
  • I am minn (https://keybase.io/minn) on keybase.
  • I have a public key ASBgRuL7OrcyzeYGjVvL7C3k4b7qzUBgbRbCpWJwScWX3Qo

To claim this, I am signing this object:

@msoe
msoe / CVE-2020-5902.md
Created July 25, 2020 02:54 — forked from cihanmehmet/CVE-2020-5902.md
BIGIP CVE-2020-5902 Exploit POC

🚨BIGIP CVE-2020-5902 Exploit POC 🔥🧱🔨👀


Shodan Seaarch

title:"Big-IP®" org:"Organization Name"
http.title:"BIG-IP®- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"

🔸LFI

@msoe
msoe / MyLabStack.yaml
Created September 25, 2019 06:07
My Lab Stack for a Single Web Server Cloudformation Template
# A web server (ports 80, 22 opened)
# on a subnet 10.1.10.0/24
# in a VPC 10.1.0.0/16
# in Region us-east-1a (N Virginia)
# Change the source IP in WebSecurityGroup to your testing IP, line 83 and 88
# Change the SSH key to yours on line 98
AWSTemplateFormatVersion: "2010-09-09"
Resources:

Agressive Scanning (-A)

$ nmap -A scanme.nmap.org

Starting Nmap 7.40 ( https://nmap.org ) at 2019-09-17 04:51 UTC
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.17s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 995 closed ports
PORT      STATE    SERVICE    VERSION
@msoe
msoe / verify-aws-ec2-key-pair-fingerprint.md
Created August 22, 2019 04:29
Verifying AWS EC2 Key Pair's Fingerprint

If you created your key pair using AWS, you can use the OpenSSL tools to generate a fingerprint as follows:

$ openssl pkcs8 -in path_to_private_key -inform PEM -outform DER -topk8 -nocrypt | openssl sha1 -c

If you created a key pair using a third-party tool and uploaded the public key to AWS, you can use the OpenSSL tools to generate the fingerprint as follows:

$ openssl rsa -in path_to_private_key -pubout -outform DER | openssl md5 -c
@msoe
msoe / aws-cli-interface.md
Created February 15, 2019 10:46
Installing AWS Command Line Interface on macOS

AWS CLI Using pip

$ pip3 install awscli

Check the installation

$ aws --version
#!/usr/local/bin/python3
## Just a concept to display the forex rates from Central Bank, KBZ Bank, AYA Bank and CB Bank of Myanmar
## TODO: clean the code
from bs4 import BeautifulSoup
import requests,re
import datetime
response = requests.get('http://forex.cbm.gov.mm/api/latest')
@msoe
msoe / panw-userid-syslog-troubleshooting.md
Last active June 22, 2018 05:16
Palo Alto Networks Firewall User-ID Mapping With Syslog Troubleshooting

PAN-OS 8.x

> show user server-monitor state all

        UDP Syslog Listener Service is enabled
        SSL Syslog Listener Service is enabled

Proxy: Cisco ISE SecureSyslog(vsys: vsys1)      Host: Cisco ISE logs(192.168.xxx.xxx)
        number of log messages                            : 1
@msoe
msoe / palo-alto-networks-firewall-packet-capture-tcpdump.md
Last active August 4, 2023 18:30
Packet Capturing with tcpdump on Palo Alto Networks Firewalls

> tcpdump filter "host 10.0.120.1 and not port 22"

> view-pcap mgmt-pcap mgmt.pcap

> scp export mgmt-pcap from mgmt.pcap to user@scpserver:/tmp

> tcpdump snaplen 0

# Run these in a superuser shell, or add sudo to the commands
# Add Docker's official GPG key
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
# Add repository
add-apt-repository \
"deb [arch=amd64] https://download.docker.com/linux/ubuntu \
$(lsb_release -cs) \
stable"