Skip to content

Instantly share code, notes, and snippets.

View pcostesi's full-sized avatar

Pablo Alejandro Costesich pcostesi

View GitHub Profile

WannaCry|WannaDecrypt0r NSA-Cybereweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. (source: malwarebytes)
  • Infections: NHS (uk), Telefonica (spain), FedEx (us), Russia interior ministry & Megafon (russia)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes)

SECURITY BULLETIN AND UPDATES HERE: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

Frontend and You

[TOC]


Introduction (a.k.a. Talk your coworkers about React before someone else does)

El stack tecnológico que estamos usando hoy en día se compone de dos partes que se encuentran íntimamente relacionadas:

@pcostesi
pcostesi / uwsgi-and-nginx.md
Last active December 28, 2019 17:38
uWSGI and NGiNX
┌──────────────────────────────────────────────────────────┐┌─────────────────────────────┐
│ + ││0: BN993Y (3661, 6311, 3003) │
│ ││Flying │
│ + + ││1: YP076X (5866, 3186, 3328) │
│ ││Flying │
│ ││2: VR129T (350, 3363, 64178) │
│ + ││Flying │
│ ││3: UI178R (1151, 4272, 9089) │
│ @ ││Flying │
│ + ││4: RH254Q (3976, 7508, 4611) │
/***************************************************************************
e-puck_line -- Base code for a practical assignment on behaviour-based
robotics. When completed, the behaviour-based controller should allow
the e-puck robot to follow the black line, avoid obstacles and
recover its path afterwards.
Copyright (C) 2006 Laboratory of Intelligent Systems (LIS), EPFL
Authors: Jean-Christophe Zufferey
Email: jean-christophe.zufferey@epfl.ch
Web: http://lis.epfl.ch
Ocurrió algo inesperado!! Seguro es un bug.
Contacte a su programador favorito ;)
Al reportalo recuerde contar contar como reproducirlo.
Fecha de suceso: Wed Mar 25 17:00:42 ART 2015
Problema raiz: java.util.NoSuchElementException
@pcostesi
pcostesi / keybase.md
Created August 21, 2014 20:53
keybase.md

Keybase proof

I hereby claim:

  • I am pcostesi on github.
  • I am pcostesi (https://keybase.io/pcostesi) on keybase.
  • I have a public key whose fingerprint is DEDF 60B2 DD52 4D91 1B09 ADAE F892 BFEA F344 AC8D

To claim this, I am signing this object:

#!/usr/bin/env python
# -*- coding: utf-8 -*-
import socket
from select import select
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# sock.bind((socket.gethostname(), 1234))
sock.bind(('', 1234))
@pcostesi
pcostesi / 0_reuse_code.js
Created April 10, 2014 20:52
Here are some things you can do with Gists in GistBox.
// Use Gists to store code you would like to remember later on
console.log(window); // log the "window" object to the console
@pcostesi
pcostesi / golf.py
Last active December 27, 2015 17:48
GOLF!
import ImageFont, ImageDraw, Image, xlrd
font = ImageFont.truetype("arial.ttf", 18)
sh = xlrd.open_workbook("the_excel.xls").sheet_by_index(0)
data = [[sh.cell_value(rowx=x, colx=y) for y in range(sh.ncols)]
for x in range(sh.nrows)]
for i, row in enumerate(data):
im = Image.open("template.png")
draw = ImageDraw.Draw(im)
draw.text((0, 0), '\n'.join(row), font=font, fill="#000")
im.save("cert-%d.png" % i, "PNG")