Skip to content

Instantly share code, notes, and snippets.

View wickett's full-sized avatar
💭
I may be slow to respond.

James Wickett wickett

💭
I may be slow to respond.
View GitHub Profile
@wickett
wickett / market_analysis_test
Created November 15, 2012 16:46
market_analysis
This is for our market analysis

tmux cheatsheet

As configured in my dotfiles.

start new:

tmux

start new with session name:

# From https://raw.github.com/chrishunt/dot-files/master/.tmux.conf
###########################
# Configuration
###########################
#use 256 term for pretty colors
set -g default-terminal "screen-256color"
# increase scroll-back history
set -g history-limit 5000
@wickett
wickett / 01-Gemfile.rb
Last active December 22, 2015 16:58
Test Driven Infra with Chef example
source 'https://rubygems.org'
group :test do
gem 'chefspec', '~> 1.3'
gem 'foodcritic', '~> 2.1'
gem 'strainer', '~> 3.0'
gem 'test-kitchen', '~> 1.0.0.alpha'
gem 'kitchen-lxc', '~> 0.0.1.beta1'
gem 'knife-spork', '~> 1.0.17'
gem 'hipchat', '~> 0.10.0'
@wickett
wickett / 01-Rugged-Dev-Workshop
Last active December 22, 2015 18:29
Steps for Rugged Driven Dev
This is the start of something great.
[1] guard(main)>
17:19:45 - INFO - Run all
17:19:45 - INFO - Running all specs
.
Finished in 0.00891 seconds
1 example, 0 failures
Called 'load' without the :safe option -- defaulting to safe mode.
17:19:49 - ERROR - Error sending notification with : can't convert nil into Hash
$ bundle exec rake
librarian-chef install
Installing chef_gem (0.1.0)
Installing rvm (0.9.1)
Installing cloudsourcery-promo (0.1.0)
foodcritic cookbooks/cloudsourcery-promo --epic-fail any
rspec cookbooks/cloudsourcery-promo
cloudsourcery-promo::default
@slow
Feature: check to make sure the right ports are open on our server
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| host | lascon.org |
Scenario: Verify server is open on expected ports
@slow
Feature: make sure our website doesn't expose sensitive directories
Scenario: Start with using dirb and check for default apache directories
Given "dirb" is installed
And the following profile:
| name | value |
| hostname | http://lascon.org |
| wordlist | vulns/apache.txt |
When I launch a "dirb" attack with:
@slow
Feature: Look for cross site scripting (xss) using arachni against a URL
Scenario: Using the arachni, look for cross site scripting and verify no issues are found
Given "arachni" is installed
And the following profile:
| name | value |
| url | http://lascon.org |
When I launch an "arachni-simple_xss" attack
Then the output should contain "0 issues were detected."