This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#TimeZones | |
#TZ='America/Mexico_City' tty-clock -sct -f "%a, %d %b %Y %T %z" | |
#TZ='America/Bogota' tty-clock -sct -f "%a, %d %b %Y %T %z" | |
#TZ='America/Lima' tty-clock -sct -f "%a, %d %b %Y %T %z" | |
#TZ='America/New_York' tty-clock -C 3 -sct -f "%a, %d %b %Y %T %z" | |
#TZ='America/Argentina/Jujuy' tty-clock -sctx -f "%a, %d %b %Y %T %z" | |
# reference https://en.wikipedia.org/wiki/List_of_tz_database_time_zones |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## ------------------------------------------------------------------ | |
## PowerShell Script To Automate Windows Update | |
## Script should be executed with "Administrator" Privilege | |
## ------------------------------------------------------------------ | |
$ErrorActionPreference = "SilentlyContinue" | |
If ($Error) { | |
$Error.Clear() | |
} | |
$Today = Get-Date |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nmap scan report for 192.168.10.145 | |
Host is up (0.00088s latency). | |
PORT STATE SERVICE | |
445/tcp open microsoft-ds | |
MAC Address: 94:DE:80:8B:DB:67 (Giga-byte Technology) | |
Host script results: | |
|_smb-vuln-ms17-010: Could not connect to 'IPC$' | |
Nmap scan report for 192.168.10.161 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Una forma de scanear la vulnerabilidad es utilizando nmap | |
Instalamos nmap: | |
#apt-get install nmap | |
Luego descarmos el script especifico para nmap | |
# cd /usr/share/nmap/scripts/ | |
# wget https://raw.githubusercontent.com/cldrn/nmap-nse-scripts/master/scripts/smb-vuln-ms17-010.nse | |
# nmap -sC -p445 --open --max-hostgroup 3 --script smb-vuln-ms17-010.nse 192.168.0.1/24 |