These instructions have moved to https://github.com/emporia-vue-local/esphome
| # Derived from this: https://github.com/gashton/bambustudio_tools/blob/master/bambudiscovery.sh | |
| # Python implementation without need for linux | |
| # Send the IP address of your BambuLab printer to port 2021/udp, which BambuStudio is listens on. | |
| # Ensure your PC has firewall pot 2021/udp open. This is required as the proper response would usually go to the ephemeral source port that the M-SEARCH ssdp:discover message. | |
| # But we are are blindly sending a response directly to the BambuStudio listening service port (2021/udp). | |
| # Temporary solution to BambuStudio not allowing you to manually specify the Printer IP. | |
| # Usage: |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log| #Requires -Version 5 -Module NetSecurity -RunAsAdministrator | |
| <# | |
| .SYNOPSIS | |
| Create-MitigationFirewallRules - Creates Windows Firewall rules to mitigate certain app whitelisting bypasses and to prevent command interpreters from accessing the Internet | |
| .DESCRIPTION | |
| A script to automatically generate Windows Firewall with Advanced Security outbound rules | |
| to prevent malware from being able to dial home. | |
| These programs will only be allowed to communicate to IP addresses within the private IPv4 RFC1918 ranges: |
| 0-mail.com | |
| 007addict.com | |
| 020.co.uk | |
| 027168.com | |
| 0815.ru | |
| 0815.su | |
| 0clickemail.com | |
| 0sg.net | |
| 0wnd.net | |
| 0wnd.org |
| <# | |
| .SYNOPSIS | |
| Configures a secure WinRM listener over HTTPS to enable | |
| SSL-based WinRM communications. This script has not been | |
| tested on Windows Server 2003R2 or earier, and may not | |
| work on these OSes for a variety of reasons. | |
| If Windows Remote Management is disabled (e.g. service | |
| stopped, GPO Policy, etc.), this script will likely fail. | |
| .DESCRIPTION |
Determine the file system by using the file-utility.
file image.imgUse mdconfig to link the IMG image to a virtual device.
mdconfig -a -t vnode -f /path/to/image.img -u 0| find -L app/design/frontend -regex '.*\(shipping\|billing\|shipping_method\|payment\).phtml' -exec grep -L formkey {} \; \ | |
| | xargs sed -i 's/<\/form>/<?php echo $this->getBlockHtml("formkey") ?><\/form>/g' | |
| find -L skin/frontend -name 'opcheckout.js' -exec grep -L form_key {} \; \ | |
| | xargs sed -i 's/if (elements\[i\].name=='\''payment\[method\]'\'') {/if (elements[i].name=='\''payment[method]'\'' || elements[i].name == '\''form_key'\'') {/g' |
Here is a simple method to fix Ruby 2.3.x OpenSSL connectivity errors (on Windows) when trying to install gems via rubygems. This method is the cleanest way to solve the problem and does not rely on you disabling any secure/https connectivity options in Ruby. Essentially, you are adding the missing CA certificate into the Ruby ssl_certs directory to complete the chain of trust.
Sample error messages:
*::Error::ConnectionFailed SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed
or:
connect_nonblock': SSL_connect returned=1 errno=0 state=error: certificate verify failed (OpenSSL::SSL::SSLError)
| Use this as an example on how to start the virtual console without the need of Java Web Start or accessing it from the web interface. | |
| You can use the user and password that you use for the web interface. | |
| You need an old JRE... I used 1.7.0_80 from the Server JRE package, also I have tested successfully 1.7.0_79 with MacOS. | |
| You don't need to install it, just extract it or copy the files in "jre" folder. | |
| Open the viewer.jnlp file that you get by launching the virtual console from the web interface with a text editor. | |
| Note the urls to the jar files. Download the main jar file avctKVM.jar and the libs for your operating system and architecture. | |
| Extract the dlls (.so Linux, .jnilib MacOS) from the jar libs. |