Ceragon produces a series of ruggedized, microwave backhaul devices used to provide connectivity to mobile, IP-based devices; usually, these devices are found in either large industrial environments, or installed on towers to provide "middle-mile" connectivity to mobile customers on behalf of ISPs. In other words, a FibeAir IP-10 typically act as a router of IP traffic. A compromise on these devices can expose the
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA1 | |
On or around March 31, 2015, if you are a registered user of | |
the Rapid7 Community at community.rapid7.com, you will notice | |
that your password will be automatically expired out, you | |
will get a password reset notification from community@rapid7.com, | |
and you will notice some significant changes on the site. | |
This is not a trick. We have not suffered a redirection |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[alias] | |
thisbranch = !"git branch --no-color | sed -e '/^[^*]/d' -e 's/* //' " | |
pull-names = !"git fetch && \ | |
echo 'Checking for diffs...' && \ | |
git diff --name-only origin/`git thisbranch` && \ | |
git pull -r origin `git thisbranch`" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function git-add-remote { | |
git remote add $1 git://github.com/$1/metasploit-framework | |
git fetch $1 | |
git branch --track $1 $1/master | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
=[ metasploit v4.3.0-dev [core:4.3 api:1.0] | |
+ -- --=[ 819 exploits - 461 auxiliary - 144 post | |
+ -- --=[ 249 payloads - 27 encoders - 8 nops | |
msf > use auxiliary/scanner/http/crawler | |
msf auxiliary(crawler) > show options | |
Module options (auxiliary/scanner/http/crawler): | |
Name Current Setting Required Description |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1.9.3p125 :004 > YAML::VERSION | |
=> "1.2.2" | |
1.9.3p125 :005 > a = "foo" | |
=> "foo" | |
1.9.3p125 :007 > a.force_encoding("BINARY") | |
=> "foo" | |
1.9.3p125 :008 > a.encoding | |
=> #<Encoding:ASCII-8BIT> | |
1.9.3p125 :009 > YAML.dump(a) | |
=> "--- !binary |-\n Zm9v\n" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Stick in your .bash_aliases to uncolor your Rails logs. Note that ^[ is really (Ctrl-V) + (ESC) | |
function all_cats_are_grey { | |
cat $1 | sed 's/^[\[[0-9;]*m//g' | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The problem: the first seven hosts of the poisoned nmap file gets you to 10.3 to 10.5% mem usage (for 8gb memory) from the sample file. | |
The first order of business is to get a sample file to be usable for test cases without actually crashing ruby, and to make the host info more useful for debugging (sequential IPs, fake target domain and names, basic attempts at anonymizing the real data). | |
top - 10:51:26 up 59 min, 7 users, load average: 0.46, 0.57, 0.47 | |
Tasks: 1 total, 0 running, 1 sleeping, 0 stopped, 0 zombie | |
Cpu(s): 3.8%us, 4.0%sy, 0.0%ni, 92.1%id, 0.0%wa, 0.0%hi, 0.2%si, 0.0%st | |
Mem: 8161728k total, 3880048k used, 4281680k free, 341184k buffers | |
Swap: 9535480k total, 0k used, 9535480k free, 1092928k cached |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
git checkout master | |
git pull -r | |
git checkout $remote/$branch | |
git rebase master # Ensure it'll merge cleanly | |
git checkout -b Pull$number | |
git diff master # Eyeball the diff locally. | |
git log -1 | grep Author | |
git checkout master | |
git merge --squash Pull432 # Wrap it up into one commit. | |
git commit --author="$author_name_and_email" # Give author credit. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function git-add-remote { | |
git remote add -f $1 git://github.com/$1/metasploit-framework | |
git branch --track $1-master $1/master | |
} |