I hereby claim:
- I am ktwombley on github.
 - I am daoist (https://keybase.io/daoist) on keybase.
 - I have a public key whose fingerprint is 75CB 8F44 0ACF 32B8 AEED 4819 AF69 C534 D60A C573
 
To claim this, I am signing this object:
| # Convert-ADName.ps1 | |
| # Written by Bill Stewart ([email protected]) | |
| # PowerShell wrapper script for the NameTranslate COM object. | |
| #requires -version 2 | |
| <# | |
| .SYNOPSIS | |
| Translates Active Directory names between various formats. | 
| accept-ranges: bytes | |
| access-control-allow-methods: GET | |
| access-control-allow-origin: * | |
| access-control-max-age: 3600 | |
| age: 2943 | |
| content-type: application/javascript | |
| date: Tue, 05 Mar 2019 15:51:12 GMT | |
| etag: "d77d08ee576a53dbb1217d83bf33efde" | |
| last-modified: Fri, 01 Mar 2019 22:13:28 GMT | |
| server: AmazonS3 | 
| #!/usr/bin/env python | |
| # Based on https://www.openwall.com/lists/oss-security/2018/08/16/1 | |
| # untested CVE-2018-10933 | |
| import sys, paramiko | |
| import logging | |
| username = sys.argv[1] | |
| hostname = sys.argv[2] | |
| command = sys.argv[3] | 
| find /proc -type d -user ${username} -prune 2>/dev/null | sed -e 's/\/proc\///' | while read thepid; do echo ${thepid} && touch /sdcard/dumps/${thepid}.mem && cat /proc/${thepid}/maps | awk '{if (a) print a; a=$0}' | awk -F'[ -]' '{print "0x"$1" 0x"$2}' | while read start finish; do echo ${thepid} ${start} $(dc ${start} 0x1000 div p) $(((${finish}-${start})/4096)) && /data/local/busybox dd if=/proc/${thepid}/mem bs=4096 seek=$(dc ${start} 0x1000 div p) skip=$(dc ${start} 0x1000 div p) count=$(((${finish}-${start})/4096)) conv=noerror,notrunc,sync,fsync of=/sdcard/dumps/${thepid}.mem 2>/dev/null; done; done | |
| # On android with busybox available at /data/local/busybox, will dump the process RAM of any process owned by $username into /sdcard/dumps/$thepid.mem. make that directory before starting. | 
I hereby claim:
To claim this, I am signing this object: