As configured in my dotfiles.
start new:
tmux
start new with session name:
This is for our market analysis |
As configured in my dotfiles.
start new:
tmux
start new with session name:
# From https://raw.github.com/chrishunt/dot-files/master/.tmux.conf | |
########################### | |
# Configuration | |
########################### | |
#use 256 term for pretty colors | |
set -g default-terminal "screen-256color" | |
# increase scroll-back history | |
set -g history-limit 5000 |
source 'https://rubygems.org' | |
group :test do | |
gem 'chefspec', '~> 1.3' | |
gem 'foodcritic', '~> 2.1' | |
gem 'strainer', '~> 3.0' | |
gem 'test-kitchen', '~> 1.0.0.alpha' | |
gem 'kitchen-lxc', '~> 0.0.1.beta1' | |
gem 'knife-spork', '~> 1.0.17' | |
gem 'hipchat', '~> 0.10.0' |
This is the start of something great. |
[1] guard(main)> | |
17:19:45 - INFO - Run all | |
17:19:45 - INFO - Running all specs | |
. | |
Finished in 0.00891 seconds | |
1 example, 0 failures | |
Called 'load' without the :safe option -- defaulting to safe mode. | |
17:19:49 - ERROR - Error sending notification with : can't convert nil into Hash |
$ bundle exec rake | |
librarian-chef install | |
Installing chef_gem (0.1.0) | |
Installing rvm (0.9.1) | |
Installing cloudsourcery-promo (0.1.0) | |
foodcritic cookbooks/cloudsourcery-promo --epic-fail any | |
rspec cookbooks/cloudsourcery-promo | |
cloudsourcery-promo::default |
@slow | |
Feature: check to make sure the right ports are open on our server | |
Background: | |
Given "nmap" is installed | |
And the following profile: | |
| name | value | | |
| host | lascon.org | | |
Scenario: Verify server is open on expected ports |
@slow | |
Feature: make sure our website doesn't expose sensitive directories | |
Scenario: Start with using dirb and check for default apache directories | |
Given "dirb" is installed | |
And the following profile: | |
| name | value | | |
| hostname | http://lascon.org | | |
| wordlist | vulns/apache.txt | | |
When I launch a "dirb" attack with: |
@slow | |
Feature: Look for cross site scripting (xss) using arachni against a URL | |
Scenario: Using the arachni, look for cross site scripting and verify no issues are found | |
Given "arachni" is installed | |
And the following profile: | |
| name | value | | |
| url | http://lascon.org | | |
When I launch an "arachni-simple_xss" attack | |
Then the output should contain "0 issues were detected." |