adulau@maurer:~$ curl -w "@curl-format.txt" -o /dev/null -s "https://services.nvd.nist.gov/rest/json/cpes/2.0/?resultsPerPage=20&startIndex=0"
time_namelookup: 0,120529s
time_connect: 0,225630s
time_appconnect: 0,386989s
time_pretransfer: 0,387033s
time_redirect: 0,000000s
time_starttransfer: 5,810461s| \documentclass[a4paper]{article} | |
| \pagestyle{plain} | |
| \usepackage{calc} | |
| \usepackage[top=0.25in,bottom=0.75in,left=0.5in,right=0.5in]{geometry} | |
| \usepackage{tikz} | |
| \newlength{\wholeboxwd} | |
| \setlength{\wholeboxwd}{0.99\textwidth} | |
| \newlength{\wholeboxht} | |
| \setlength{\wholeboxht}{0.95\textheight} |
I hereby claim:
- I am adulau on github.
- I am adulau (https://keybase.io/adulau) on keybase.
- I have a public key whose fingerprint is 6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5
To claim this, I am signing this object:
| { | |
| "identity": "recursive-5003", | |
| "qname": "www.aboil.info.", | |
| "rrtype": "A", | |
| "query-ip": "127.0.0.1", | |
| "query-port": 34882, | |
| "response-ip": "127.0.0.1", | |
| "response-port": 5003, | |
| "latency": 0.027, | |
| "message": "CLIENT_RESPONSE", |
It's using the index and the gzip member file to seek to the exact record in the HTTP request.
- First find the Hockeypuck hash of the key(s) to be removed via the web search of your key server instance;
- On the index, copy the hash value (
Hash=HASHVALUE) (it's the hex representation of MD5); - Connect to the PostgreSQL interface of your Hockeypuck server;
psql hkp- Find the corresponding keys from their hash value;
select rfingerprint from keys where md5 in ('HASHVALUE');- This will return the corresponding fingerprints;
- Then delete the associated sub-keys;
| http://95.107.48.115:80/announce | |
| http://agusiq-torrents.pl:6969/announce | |
| http://asnet.pw:2710/announce | |
| http://fxtt.ru:80/announce | |
| http://grifon.info:80/announce | |
| http://mgtracker.org:2710/announce | |
| http://mgtracker.org:6969/announce | |
| http://ns349743.ip-91-121-106.eu:80/announce | |
| http://open.acgnxtracker.com:80/announce | |
| http://pt.lax.mx:80/announce |
List of services which are giving access to Tor network and especially Tor hidden services
via web interface. We keep track of potential injection or abuse from such service (the column Scam).
| Url | Status | Domain | Log | Techno | Scam |
|---|---|---|---|---|---|
| https://onion.re/ | DOWN | onion.re | full | custom | no |
Analysed directory /usr/lib/modules/5.11.0-41-generic/ on maurer running Linux-5.11.0-43-generic-x86_64-with-glibc2.29 at 2022-01-02 11:20:10.596458+00:00.
Run with hashlookup-forensic-analysed version 0.8.
| Hashlookup type | Numbers |
|---|
title: "Hashlookup service - how to improve your digital forensic investigations" author: "Alexandre Dulaunoy" institute: "CIRCL" theme: "Frankfurt" colortheme: "beaver" fonttheme: "professionalfonts" mainfont: "Hack Nerd Font" fontsize: 10pt urlcolor: red