Skip to content

Instantly share code, notes, and snippets.

View jedisct1's full-sized avatar

Frank Denis jedisct1

View GitHub Profile
@jedisct1
jedisct1 / duh.txt
Created October 18, 2012 21:27
Duh
This is a case that I don't recall seeing before, and let me start by saying that I have only a tenuous relationship with these domain names; they're for an online store and magazine having to do with small boat building, and I've ordered a couple of things and read a bunch of articles but that's it, they aren't my domains or my websites.
The symptom is simple: neither domain, duckworksbbs.com and duckworksmagazine.com, will resolve, because the com servers have bogus NS records for them:
[cookiemonster:~] owens% dig duckworksmagazine.com @a.gtld-servers.net ns
; <<>> DiG 9.8.3-P2 <<>> duckworksmagazine.com @a.gtld-servers.net ns
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26991
@jedisct1
jedisct1 / juniper-pulse-flaw.txt
Created October 25, 2012 21:16
juniper-pulse-flaw
The Junos Pulse Secure Access Service provides client-less access to remote web sites.
The service acts as a HTTPS proxy. Before sending content to the client, HTML, Javascript and CSS files are parsed and transformed in order to change remote links to local, VPN-aware links.
For example, links to http://www.openbsd.com get changed to https://vpn1.office.example.com/,DanaInfo=www.openbsd.com,SSO=U+ before being delivered to the client.
Javascript methods like open() and eval() are also transformed to secure wrappers like DanaMethodOpen() and DanaEval(). These wrappers ensure than no external URL can ever get directly reached by the browser, thus defeating the purpose of the VPN.
However, the Dana filters can easily be circumvented.
Sensible properties like document.cookies are mangled.
@jedisct1
jedisct1 / gist:4464574
Last active December 10, 2015 16:59
Computing the pagerank of a natural graph with 33.5 million vertices, 1 billion edges with GraphLab, on a 10 nodes cluster: 118 seconds. 29 iterations is what it takes to converge to a tolerance of 1/10000.
INFO: distributed_ingress_base.hpp(exchange_global_info:493): Graph info:
nverts: 33561139
nedges: 983368362
nreplicas: 84780542
replication factor: 2.52615
#vertices: 33561139 #edges:983368362
INFO: synchronous_engine.hpp(synchronous_engine:994): Engine Option: max_iterations = 50
INFO: synchronous_engine.hpp(synchronous_engine:1004): Engine Option: use_cache = 1
INFO: synchronous_engine.hpp(start:1249): Iteration counter will only output every 5 seconds.
INFO: synchronous_engine.hpp(start:1264): 0: Starting iteration: 0
@jedisct1
jedisct1 / win32_redyms_cnc
Last active December 12, 2015 04:08
Win32/Redyms C&C domains
anzku-bqe.net
anzku-bqejnqs.net
anzkulb-ejn.net
anzkulb-ejnqsbj.net
boalvm-rfkor.net
boalvmcr-k.net
boalvmcr-kortc.net
cpbmw-dsg.net
cpbmw-dsglpsu.net
cpbmwnd-glp.net
@jedisct1
jedisct1 / sexydns.c
Created March 1, 2013 08:43
Double fail.
const uint32_t seed = 9109910; /* todo: consider using a random seed */
MurmurHash3_xnn_128(name_bundle, name_bundle_len, seed, &hash32[0]);
@jedisct1
jedisct1 / dyndns malware.txt
Created March 4, 2013 23:19
dyndns malware
aaxssy.myftp.biz. IN A 46.165.221.147
aksqsv.myftp.biz. IN A 46.165.221.147
arkfyr.myftp.biz. IN A 46.165.221.147
asafom.myftp.biz. IN A 46.165.221.147
axrwbi.myftp.biz. IN A 46.165.221.147
azezmr.myftp.biz. IN A 46.165.221.147
bcdmou.myftp.biz. IN A 46.165.221.147
bditdq.myftp.biz. IN A 46.165.221.147
bewulf.myftp.biz. IN A 46.165.221.147
bjksao.myftp.biz. IN A 46.165.221.147
@jedisct1
jedisct1 / universal.diff
Created March 9, 2013 04:24
Add --universal to the libsodium Homebrew formula
diff --git a/Library/Formula/libsodium.rb b/Library/Formula/libsodium.rb
index 31b76a2..75c6c0f 100644
--- a/Library/Formula/libsodium.rb
+++ b/Library/Formula/libsodium.rb
@@ -5,7 +5,10 @@ class Libsodium < Formula
url 'http://download.dnscrypt.org/libsodium/releases/libsodium-0.3.tar.gz'
sha1 '3d486dc40e7cbd9542d00088d3b73a719d7746fa'
+ option :universal
+
@jedisct1
jedisct1 / g01exploit-dga.rb
Last active December 14, 2015 21:09
g01 exploit kit DGA names generator
#! /usr/bin/env ruby
DOMAINS = %w(.doesntexist.com .dnsalias.com .dynalias.com)
DICT = %w(as un si speed no r in me da a o c try to n h call us why q
k old j g how ri i net t ko tu host on ad portal na order b ask l s d
po cat for m off own e f p le is)
DICT_LEN = DICT.length
$ drill one.net @8.8.8.8
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 13896
;; flags: qr rd ra ; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; one.net. IN A
;; ANSWER SECTION:
one.net. 582 IN A 66.83.21.49
one.net. 582 IN A 66.83.21.33
1224822 300
502980 60
309613 20
284357 3600
276605 600
141429 30
123684 1800
102240 14400
90921 900
67795 120