Skip to content

Instantly share code, notes, and snippets.

versionsix

Block or report user

Report or block versionsix

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@inntran
inntran / vzw-lte-ipv6-prefix-translation.md
Last active Jul 23, 2019
To configure IPv6 NPTv6 on Linux to allow more hosts behind Verizon Wireless LTE IPv6 single /64 prefix
View vzw-lte-ipv6-prefix-translation.md

Problem

Verizon Wireless assigns you ONE IPv4 address and ONE /64 IPv6 prefix for their cellular service, and VZW would reset your datalink once they received 1 packet with an illegal source address.

We have NAT for IP but for IPv6 we would like to avoid address translation to get some kind of end-to-end communication.

Solution

NPTv6, defined in RFC6296, would help us to do stateless prefix translation for IPv6.

@smoser
smoser / .gitignore
Last active Feb 14, 2020
cloud-init ubuntu nocloud example with network config
View .gitignore
*.img
*.raw
@danehans
danehans / jool.MD
Last active Sep 24, 2019
Jool NAT64
View jool.MD

Note: Dues to Jool's GRO offload limitation, it can not be used in cloud environments such as GCE.

Jool NAT64 (WIP)

NAT64 runs on an Ubuntu 16.04.2 host and is implemented using Jool v3.5.4. Start by installing the Jool dependencies:

sudo apt-get update && sudo apt-get install -y zip gcc make linux-headers-$(uname -r) dkms \
pkg-config libnl-genl-3-dev autoconf
@nottrobin
nottrobin / clean-juju-model.sh
Last active Jan 15, 2020
To clean out a Juju model so you can use it from scratch, without deleting and recreating it
View clean-juju-model.sh
# Clear out a model, for Juju 2
# ==
# Destroy all machines and remove applications
# --
clean_model() {
model_name=${1}
juju status --model ${model_name} --format json | jq '.machines' | jq -r 'keys[]' | xargs -n 1 juju remove-machine --force # Force destroy all machines
juju status --model ${model_name} --format json | jq '.applications' | jq -r 'keys[]' | xargs -n 1 juju remove-application # Remove all applications
watch -c -n 10 juju status --model ${model_name} --color
View convertCentOS7toRHEL7.sh
#!/bin/sh
showHelp() {
cat <<EOF
This script requires 2 or 3 arguments exactly.
"${0}" <redhat username> <redhat password> [<redhat release>]
examples:
"${0}" user1 passw0rd! 7Server
"${0}" user2 pAssw@rd
By default the omission of the release version will default to 7Server being set.
View Wannacrypt0r-FACTSHEET.md

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

@davydany
davydany / IPTABLES-CHEATSHEET.md
Last active Feb 16, 2020
IP Tables (iptables) Cheat Sheet
View IPTABLES-CHEATSHEET.md

IP Tables (iptables) Cheat Sheet

IPTables is the Firewall service that is available in a lot of different Linux Distributions. While modifiying it might seem daunting at first, this Cheat Sheet should be able to show you just how easy it is to use and how quickly you can be on your way mucking around with your firewall.

Resources

The following list is a great set of documentation for iptables. I used them to compile this documentation.

@george-hawkins
george-hawkins / arm64.md
Last active Jan 31, 2020
Running virtualized x86_64 and emulated arm64 Ubuntu cloud images using QEMU
View arm64.md

QEMU arm64 cloud server emulation

This is basically a rehash of an original post on CNXSoft - all credit (particularly for the Virtio device arguments used below) belongs to the author of that piece.

Download the latest uefi1.img image. E.g. ubuntu-16.04-server-cloudimg-arm64-uefi1.img from https://cloud-images.ubuntu.com/releases/16.04/release/

Download the UEFI firmware image QEMU_EFI.fd from https://releases.linaro.org/components/kernel/uefi-linaro/latest/release/qemu64/

Determine your current username and get your current ssh public key:

@htp
htp / curl-websocket.sh
Last active Feb 20, 2020
Test a WebSocket using curl.
View curl-websocket.sh
curl --include \
--no-buffer \
--header "Connection: Upgrade" \
--header "Upgrade: websocket" \
--header "Host: example.com:80" \
--header "Origin: http://example.com:80" \
--header "Sec-WebSocket-Key: SGVsbG8sIHdvcmxkIQ==" \
--header "Sec-WebSocket-Version: 13" \
http://example.com:80/
You can’t perform that action at this time.