superfish.pem
contains:
- the Superfish certificate as found by both Chris Palmer and Matt Burke;
- the encrypted private key as found by Karl Koscher.
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
def versions = [] | |
def f = new File('mock-version-tags.txt') | |
f.eachLine { versions << it } | |
def versionComparator = { a, b -> | |
def VALID_TOKENS = /._/ | |
a = a.tokenize(VALID_TOKENS) | |
b = b.tokenize(VALID_TOKENS) | |
for (i in 0..<Math.max(a.size(), b.size())) { |
superfish.pem
contains:
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis (mike.philip.davis@gmail.com) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
# The author disclaims copyright to this source code. | |
import select |
#!/bin/bash | |
# scrot -> pomf.se, by @__akiaki | |
SCROTARGS=() | |
while (( "$#" )); do | |
if [ "$1" == "--delete" ]; then | |
DELETE=1 | |
else | |
SCROTARGS+=($1) |