-
Install the jdk.
$ sudo apt update $ sudo apt install default-jdk
-
Create a new user.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# "Does anyone know how to use xrandr" glitch slides using ffmpeg. #lca2020 | |
# Author: Michael Farrell <micolous+git@gmail.com> | |
# License: BSD-2-Clause or CC-0 (your choice). | |
# | |
###### | |
# | |
# For linux.conf.au in Gold Coast, Ruan (@xfxf) asked me to make a simple "smoosh / defrag" | |
# slide that would be displayed as a holding slide between talks. I made some others with some | |
# AV team "in-jokes"... :) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
set -u | |
set -e | |
set -o pipefail | |
GCP_PROJECT="$(gcloud config list --format 'value(core.project)')" | |
GCP_SERVICES=( | |
"storage-api.googleapis.com" |
In order of first appearance in The Morning Paper.
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Forticlient SSL VPN Client launching script utilizing expect. | |
# -------------------------------------------- | |
# CONFIGURATION | |
# If empty - script will take some simple logic to locate appropriate binary. | |
FORTICLIENT_PATH="" |