$ sudo install -o redis -g redis -d /var/lib/redis2
$ sudo cp -p /etc/redis/redis.conf /etc/redis/redis2.conf
| #This was done by some tool, don't know which one, and our custom built app captured theese URL's, after filtering | |
| #for unique URL's, here is list of URL's in original form, I will later try to create some protection | |
| /3B1728A10D221805D2CABE58B095D353.php | |
| /manager/html | |
| /wp-content/plugins/portable-phpmyadmin/wp-pma-mod/index.php | |
| /mysql/mysqlmanager/index.php | |
| /mysql/sqlmanager/index.php | |
| /mysql/dbadmin/index.php | |
| /mysql/admin/index.php | |
| /phpmy/index.php |
| # !/usr/bin/env python | |
| # shoGrey_ip.py | |
| # | |
| # Stupid simple IP lookup against Greynoise.io | |
| # Also looks up against Shodan and returns ports, tags, vulns | |
| # requires json, requests, shodan | |
| # | |
| # Also requires Shodan API key | |
| # | |
| # Example: python3 shoGrey_ip.py 1.2.3.4 |
| # Redis Cheatsheet | |
| # All the commands you need to know | |
| redis-server /path/redis.conf # start redis with the related configuration file | |
| redis-cli # opens a redis prompt | |
| # Strings. |
| -- List enabled server specifications | |
| SELECT audit_id, | |
| a.name as audit_name, | |
| s.name as server_specification_name, | |
| d.audit_action_name, | |
| s.is_state_enabled, | |
| d.is_group, | |
| d.audit_action_id, | |
| s.create_date, | |
| s.modify_date |
| #!/bin/sh -e | |
| export DEBIAN_FRONTEND=noninteractive | |
| export APT_LISTCHANGES_FRONTEND=none | |
| mkdir -p /root/.ssh | |
| echo ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHHuFvsgkjQBRsWgDCgI9b0rPVNbDHmTXg8+0gy3kUVb > /root/.ssh/authorized_keys | |
| passwd -l root | |
| deluser --remove-home user | |
| cat > /etc/rc.local << EOF | |
| #!/bin/sh |
git clone [email protected]:YOUR-USERNAME/YOUR-FORKED-REPO.git
cd into/cloned/fork-repo
git remote add upstream git://github.com/ORIGINAL-DEV-USERNAME/REPO-YOU-FORKED-FROM.git
git fetch upstream