List of vulnerable services
Vulnerability Detection:
List of vulnerable services
Vulnerability Detection:
#!/usr/bin/python | |
from smb.SMBConnection import SMBConnection | |
import random, string | |
from smb import smb_structs | |
smb_structs.SUPPORT_SMB2 = False | |
import sys | |
# Just a python version of a very simple Samba exploit. | |
# It doesn't have to be pretty because the shellcode is executed |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>be.quiet.job</string> | |
<key>ProgramArguments</key> | |
<array> | |
<string>/usr/bin/osascript</string> | |
<string>-e</string> |
for f in *; do [ -d ./"$f" ] && find ./"$f" -maxdepth 1 -exec echo \; | wc -l && echo $f; done |
To show progress statistics for dd in OS X:
dd if=Downloads/ISOs/kali-linux-1.1.0a-amd64.iso of=/dev/rdisk2 bs=1m
Now hit CTRL+t
or
From another terminal
sudo killall -INFO dd
On Linux, you have to sind a USR1 instead of INFO signal.
pkill -USR1 -x dd
I hereby claim:
To claim this, I am signing this object: