Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/python
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions.
# Michael Davis ([email protected])
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
import select
@0x4d4e
0x4d4e / cloudprint.service
Created January 11, 2013 14:03
systemd cloudprint service file
Description=Google Cloudprint daemon
Requires=cups.service
After=cups.service
[Service]
User=cloudprint
#Not forking, cloudprint.py tries using /dev/tty for stdout/stderr even in daemon mode.
#Type=forking
#PIDFile=/var/run/cloudprint.pid
ExecStart=/usr/bin/cloudprint #-d -p /var/run/cloudprint.pid