Skip to content

Instantly share code, notes, and snippets.

View nsuan's full-sized avatar

Nick Suan nsuan

  • Sourcefire
  • Maryland
View GitHub Profile
subnet 172.16.0.0 netmask 255.255.252.0 {
option routers 172.16.1.200; # Default Gateway
option subnet-mask 255.255.252.0;
option broadcast-address 172.16.3.255;
option domain-name-servers 172.16.0.245;
option netbios-name-servers 172.16.1.245;
range 172.16.1.205 172.16.1.253;
next-server 172.16.1.200; #TFTP server
}
//#include "iostream.h"
#include "stdio.h"
void main() {
int i, n, x;
i = 2;
printf( "Input number: ");
scanf( "%d" , &n);
x = 0;
while( i <= n) {
//#include "iostream.h"
#include "stdio.h"
void main() {
int i, n, x;
i = 2;
while(n > 0) {
printf( "Input a number. Enter a negative number to exit: ");
scanf( "%d" , &n);
dir = '/mnt/backup/'
localbind = '0.0.0.0'
def fixpath(path, netloc):
return path
<?php
$def_img_url="wolf-grass.jpg";
//default image to redirect to if no images exist in random dir
//read folder
$folder=opendir(getcwd());
while ($file = readdir($folder)){
$ext=strtolower(substr(trim($file),-4));
https://www.vmware.com/tryvmware/p/activate.php?p=converter&cmp=EMC-ConverterEvalActivation&li=activate&a=DOWNLOAD_FILE&baseurl=http://download2.vmware.com/software/vi/&filename=VMware-converter-4.0.1-161434.exe
<?php
define('IMAGE_FILE_HEADER_OFFSET',16);
define('IMAGE_NT_OPTIONAL_HDR_OFFSET',66);
function testPE($file) {
$fp = fopen($file,'rb');
$bits = fread($fp,2);
$peInfo['is_pe'] = false;
if(($bits == "MZ") || ($bits == "ZM")) {
#echo $bits . "\n";
fseek($fp,60);
16:35:46.336361 IP 172.16.3.8.40308 > 172.16.1.200.53: 1996+ A? *.8.85.in-addr.arpa.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog. (93)
16:35:46.339920 IP 172.16.1.200.53 > 172.16.3.8.50979: 37756 NXDomain* 0/1/0 (194)
16:35:46.340270 IP 172.16.3.8.35484 > 172.16.1.200.53: 30046+ A? 210.A.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog. (127)
16:35:46.367673 IP 172.16.1.200.53 > 172.16.3.8.41821: 6998 NXDomain* 0/1/0 (212)
16:35:46.368185 IP 172.16.3.8.38526 > 172.16.1.200.53: 35753+ A? 0.f.f.ip6.arpa.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog. (104)
16:35:46.369054 IP 172.16.1.200.53 > 172.16.3.8.38526: 35753 NXDomain* 0/1/0 (179)
16:35:46.369450 IP 172.16.3.8.58238 > 172.16.1.200.53: 20243+ A? 0.f.f.ip6.arpa.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog.thefrog. (112)
16:35:46.370019 IP 172.16.1.200.53 > 172.16.3.8.58238: 20243 NXDomain* 0/1/0 (187)
16:35:46.372162 IP 172.16.3.8.35874 > 1
Found: 10431746 <13>Sep 8 10:08:20 home-off-d5f0ac cwsandbox::#1.2904: resContinue <= PID:2808,TID:2868,Caller:$00400000("10431746.exe"),BEFORE,typFileSystem."CreateFileA" - <create_open_file filetype="file" srcfile="C:\\WINDOWS\\system32\\3ca9bac5d9or2z22.cpl" creationdistribution="OPEN_ALWAYS" desiredaccess="FILE_ANY_ACCESS" shareaccess="FILE_SHARE_READ FILE_SHARE_WRITE" flags="FILE_ATTRIBUTE_NORMAL SECURITY_ANONYMOUS"/>
Found: 10431746 <13>Sep 8 10:08:20 home-off-d5f0ac cwsandbox::#1.2917: resContinue <= PID:2808,TID:2868,Caller:$00400000("10431746.exe"),BEFORE,typFileSystem."CreateFileA" - <create_open_file filetype="file" srcfile="C:\\WINDOWS\\system32\\69bdzackdoo529299.dll" creationdistribution="OPEN_ALWAYS" desiredaccess="FILE_ANY_ACCESS" shareaccess="FILE_SHARE_READ FILE_SHARE_WRITE" flags="FILE_ATTRIBUTE_NORMAL SECURITY_ANONYMOUS"/>
Found: 10431746 <13>Sep 8 10:08:20 home-off-d5f0ac cwsandbox::#1.2923: resContinue <= PID:2808,TID:2868,Caller:$00400000("10431746.exe"),BEFORE,typFileSystem."CreateF
import socket, select
import threading, Queue, random
#import _mysql as mysql
import time
UDP_IP="0.0.0.0"
UDP_IP6 = "::"
UDP_PORT=53
WORKERS=100
RESOLVERADDRESGOESHERE=