List of vulnerable services
Vulnerability Detection:
List of vulnerable services
Vulnerability Detection:
| #!/usr/bin/python | |
| from smb.SMBConnection import SMBConnection | |
| import random, string | |
| from smb import smb_structs | |
| smb_structs.SUPPORT_SMB2 = False | |
| import sys | |
| # Just a python version of a very simple Samba exploit. | |
| # It doesn't have to be pretty because the shellcode is executed |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>Label</key> | |
| <string>be.quiet.job</string> | |
| <key>ProgramArguments</key> | |
| <array> | |
| <string>/usr/bin/osascript</string> | |
| <string>-e</string> |
| for f in *; do [ -d ./"$f" ] && find ./"$f" -maxdepth 1 -exec echo \; | wc -l && echo $f; done |
To show progress statistics for dd in OS X:
dd if=Downloads/ISOs/kali-linux-1.1.0a-amd64.iso of=/dev/rdisk2 bs=1m
Now hit CTRL+t
or
From another terminal
sudo killall -INFO dd
On Linux, you have to sind a USR1 instead of INFO signal.
pkill -USR1 -x dd
I hereby claim:
To claim this, I am signing this object: