1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
# | |
# read/write access to python's memory, using a custom bytearray. | |
# some code taken from: http://tinyurl.com/q7duzxj | |
# | |
# tested on: | |
# Python 2.7.10, ubuntu 32bit | |
# Python 2.7.8, win32 | |
# | |
# example of correct output: | |
# inspecting int=0x41424344, at 0x0228f898 |
1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
# Importer une clé | |
gpg --import [filename] | |
# Rechercher une clé depuis serveur distant | |
gpg --keyserver pgp.mit.edu --search-keys KEYID | |
# Importer une clé depuis un serveur distant | |
gpg --keyserver pgp.mit.edu --recv-keys KEYID | |
# Exporter une clé sur un serveur distant |
This project has moved to https://github.com/jonhoo/drwmutex so it can be imported into Go applications.
#!/usr/bin/python | |
""" | |
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya | |
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by | |
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()' | |
in libtalloc does not write a value on 'creds' address. | |
Reference: | |
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ |
I've been looking for the best Linux backup system, and also reading lots of HN comments.
Instead of putting pros and cons of every backup system I'll just list some deal-breakers which would disqualify them.
Also I would like that you, the HN community, would add more deal breakers for these or other backup systems if you know some more and at the same time, if you have data to disprove some of the deal-breakers listed here (benchmarks, info about something being true for older releases but is fixed on newer releases), please share it so that I can edit this list accordingly.
#include <stdio.h> | |
#include <stdlib.h> | |
#include <assert.h> | |
#include <signal.h> | |
#include <errno.h> | |
#include <fcntl.h> | |
#include <stddef.h> | |
#include <sys/syscall.h> | |
#include <sys/types.h> | |
#include <sys/stat.h> |
# http://stackoverflow.com/questions/4777042/can-i-use-tcpdump-to-get-http-requests-response-header-and-response-body | |
# https://www.wireshark.org/tools/string-cf.html | |
$ sudo tcpdump -i any -s 1000 -A '(tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420) or (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354) or (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x48545450)' | |
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
listening on any, link-type LINUX_SLL (Linux cooked), capture size 1000 bytes | |
15:20:32.854565 IP localhost.40462 > localhost.webcache: Flags [P.], seq 3912982045:3912982332, ack 15901959, win 513, options [nop,nop,TS val 3952328954 ecr 3952328954], length 287 | |
E..S..@.@................;^..........G..... | |
........GET / HTTP/1.0 | |
X-Real-IP: 2401:2500:102:1104:133:242:135:220 |
dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 | 245272 | |
---|---|---|
32:f9:38:a2:39:d0:c5:f5:ba:bd:b7:75:2b:00:f6:ab | 197846 | |
d0:db:8a:cb:74:c8:37:e4:9e:71:fc:7a:eb:d6:40:81 | 152046 | |
34:47:0f:e9:1a:c2:eb:56:eb:cc:58:59:3a:02:80:b6 | 140777 | |
df:17:d6:57:7a:37:00:7a:87:5e:4e:ed:2f:a3:d5:dd | 91904 | |
81:96:a6:8c:3a:75:f3:be:84:5e:cc:99:a7:ab:3e:d9 | 80499 | |
7c:a8:25:21:13:a2:eb:00:a6:c1:76:ca:6b:48:6e:bf | 78172 | |
1c:1e:29:43:d2:0c:c1:75:40:05:30:03:d4:02:d7:9b | 71851 | |
8b:75:88:08:41:78:11:5b:49:68:11:42:64:12:6d:49 | 70786 | |
c2:77:c8:c5:72:17:e2:5b:4f:a2:4e:e3:04:0c:35:c9 | 68654 |
$fs=1; | |
$fa=1; | |
servo_l = 24; | |
servo_w = 13; | |
servo_h = 21; | |
bolt_hole_diameter = 4.5; | |
servo_axis_diameter = 4; |