- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
Get-TfsItemHistory "$/PROJECTNAME" -Recurse -Version "D1/1/10~D12/31/10" | Sort CreationDate | Select ChangeSetId,Committer,Comment,CreationDate | Format-Table ChangeSetId,CreationDate,Committer,Comment -Auto -Wrap | out-file "full.txt" |
Clear-Host | |
Set-PSDebug -Trace 0 | |
Set-StrictMode -Version Latest | |
# | |
# Function Send() | |
# | |
# Sends an email using the specified to/from, subject, body, and | |
# and SMTP server. Allows an attachment to be included. Also includes | |
# in the body the source path of the running script to improve |
import boto3 | |
print(boto3.client('sts').get_caller_identity()['Account']) |
This is a guide that I wrote to improve the default security of my website https://fortran.io , which has a certificate from LetsEncrypt. I'm choosing to improve HTTPS security and transparency without consideration for legacy browser support.
I would recommend these steps only if you have a specific need for information security, privacy, and trust with your users, and/or maintain a separate secure.example.com domain which won't mess up your main site. If you've been thinking about hosting a site on Tor, then this might be a good option, too.
The best resources that I've found for explaining these steps are https://https.cio.gov , https://certificate-transparency.org , and https://twitter.com/konklone