Skip to content

Instantly share code, notes, and snippets.

@espreto
espreto / enum_controllers
Last active August 29, 2015 14:11
List of some APIs present in SDN controllers to obtain sensitive information.
FloodLight port 8080:
/wm/core/controller/switches/json - List of all switch DPIDs connected to the controller
/wm/core/controller/summary/json - Controller summary (# of Switches, # of Links, etc)
/wm/core/memory/json - Current controller memory usage
/wm/core/health/json - Status/Health of REST API
/wm/core/system/uptime/json - Controller uptime
/wm/topology/external-links/json - Show "external" links, i.e., multi-hop links discovered by BDDP instead of LLDP packets
/wm/topology/links/json - Show DIRECT and TUNNEL links discovered based on LLDP packets
/wm/staticflowentrypusher/list/all/json - List static flows for a switch or all switches
/wm/firewall/rules/json - List all existing rules in json format
@espreto
espreto / blogs_about_pentest
Created February 28, 2015 14:37
Blogs about pentests
http://carnal0wnage.attackresearch.com/
http://www.mcgrewsecurity.com/
http://www.gnucitizen.org/blog/
http://www.darknet.org.uk/
http://www.spylogic.net/
http://taosecurity.blogspot.com.br/
http://www.room362.com/
http://blog.sipvicious.org/
http://blog.portswigger.net/
http://pentestmonkey.net/blog
freak() { grep ' EXP-' &>/dev/null <(timeout 2 openssl s_client -connect $1:443 -cipher EXPORT 2>/dev/null) && echo PROBABL_VULNERABLE || echo PROBABLY_SECURE ;}
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
Rank = GoodRanking