Skip to content

Instantly share code, notes, and snippets.

View Prototype-X's full-sized avatar

Maxim Prototype-X

View GitHub Profile
@Prototype-X
Prototype-X / tmux_vs_screen.md
Created September 21, 2017 20:52 — forked from P7h/tmux_vs_screen.md
tmux vs screen commands

tmux vs. screen commands


Action tmux screen
start a new session tmux
tmux new
tmux new-session
screen
start a new session with a name tmux new -s name screen -S name
re-attach a detached session tmux attach
tmux attach-session
screen -r
re-attach a detached session with a name tmux attach -t name
tmux a -t name
screen -r name
re-attach an attached session (detaching it from elsewhere) tmux attach -dtmux attach-session -d screen -dr
@Prototype-X
Prototype-X / mac-vendor.txt
Created November 19, 2017 12:25 — forked from aallan/mac-vendor.txt
List of MAC addresses with vendors identities
000000 Officially Xerox
000001 SuperLAN-2U
000002 BBN (was internal usage only, no longer used)
000003 XEROX CORPORATION
000004 XEROX CORPORATION
000005 XEROX CORPORATION
000006 XEROX CORPORATION
000007 XEROX CORPORATION
000008 XEROX CORPORATION
000009 powerpipes?
@Prototype-X
Prototype-X / gist:7852b196b95842d9581a482afdb1158b
Created February 6, 2018 08:11 — forked from mattm7n/gist:1405067
Monitor DHCP traffic with tcpdump
# Monitoring on interface eth0
tcpdump -i eth0 -n port 67 and port 68
@Prototype-X
Prototype-X / tcp_flags.txt
Created February 28, 2018 19:59 — forked from tuxfight3r/tcp_flags.txt
tcpdump - reading tcp flags
##TCP FLAGS##
Unskilled Attackers Pester Real Security Folks
==============================================
TCPDUMP FLAGS
Unskilled = URG = (Not Displayed in Flag Field, Displayed elsewhere)
Attackers = ACK = (Not Displayed in Flag Field, Displayed elsewhere)
Pester = PSH = [P] (Push Data)
Real = RST = [R] (Reset Connection)
Security = SYN = [S] (Start Connection)
@Prototype-X
Prototype-X / haproxy_corosync_pacemaker_ubuntu.md
Created March 6, 2018 13:44 — forked from Ham5ter/haproxy_corosync_pacemaker_ubuntu.md
Set up HAProxy with Pacemaker/Corosync on Ubuntu 16.04

Set up HAProxy with Pacemaker/Corosync on Ubuntu 16.04

This Document roughly describes a HAProxy Cluster Setup on Ubuntu 16.04 based on an example Configuration with 3 Nodes

This Document is still work in Progress the Following Stuff still needs to be done:

  • Explain the crm configure steps
  • explain Miscellaneous CRM Commands for Cluster Management
  • Add all the external ressources used.
  • Add a simple HAProxy Configuration for testing purpouse
Signal Value Action Comment
SIGHUP 1 Term Hangup detected on controlling terminal or death of controlling process
SIGINT 2 Term Interrupt from keyboard
SIGQUIT 3 Core Quit from keyboard
SIGILL 4 Core Illegal Instruction
SIGABRT 6 Core Abort signal from abort(3)
SIGFPE 8 Core Floating point exception
SIGKILL 9 Term Kill signal
SIGSEGV 11 Core Invalid memory reference
SIGPIPE 13 Term Broken pipe: write to pipe with no readers
@Prototype-X
Prototype-X / sysrq.md
Last active March 28, 2018 09:06
sysrq

Linux Magic System Request Key Hacks

Documentation for sysrq.c

What is the magic SysRq key?


It is a 'magical' key combo you can hit which the kernel will respond to
regardless of whatever else it is doing, unless it is completely locked up.
@Prototype-X
Prototype-X / ssh_tunnels.sh
Last active July 21, 2022 20:08 — forked from billautomata/ssh_tunnels.sh
ssh port forwarding cheatsheet
# local port forwarding
# the target host 192.168.0.100 is running a service on port 8888
# and you want that service available on the localhost port 7777
ssh -L 7777:localhost:8888 [email protected]
# remote port forwarding
# you are running a service on localhost port 9999
# and you want that service available on the target host 192.168.0.100 port 12340
@Prototype-X
Prototype-X / gist:db9a3c68d68b2639b74c9e424a2e9576
Last active April 9, 2019 08:07 — forked from MinaMikhailcom/gist:0825906230cbbe478faf4d08abe9d11a
Fix for "couldn't run /usr/bin/dumpcap in child process: permission denied"
sudo dpkg-reconfigure wireshark-common #Select "Yes"
chmod +x /usr/bin/dumpcap
sudo setcap 'CAP_NET_RAW+eip CAT_NET_ADMIN+eip' /usr/bin/dumpcap
or
`sudo setcap 'CAP_NET_RAW+eip CAT_NET_ADMIN+eip' $(which dumpcap)'