Skip to content

Instantly share code, notes, and snippets.

@suzannealdrich
suzannealdrich / diff_response_headers
Last active August 15, 2017 20:31
Installing Railgun with LEMP for CentOS 6.6
#!/bin/bash
# Returns the diff between response headers of a domain vs. its origin ip. Requires SSL.
NAME=`basename $0`
COMMAND="diff <(curl -Isk https://$1) <(curl -Isk -H 'Host: $1' https://$2)"
if [ $# -ne 2 ]
then
echo "Usage: $NAME domain.tld origin.ip" 1>&2
echo "Returns the response headers and a diff of a domain vs. its origin ip. Requires SSL." 1>&2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
PGP Key Transition Statement
Suzanne Aldrich <[email protected]>
Wed May 4 06:55:38 UTC 2016
I have generated a new PGP key, and this statement generated at the date and
time provided above, is signed using both my old key and my new key. This
change was not prompted by any specific incident, and was done simply to
@suzannealdrich
suzannealdrich / 1-macOS-10.15-catalina-setup.md
Last active April 16, 2024 08:13 — forked from kevinelliott/1-macOS-10.15-catalina-setup.md
macOS 10.15 Catalina Mostly-Automated Setup
@suzannealdrich
suzannealdrich / 1-macOS-12-monterey-setup.md
Last active October 27, 2024 04:17
macOS 12 Monterey Mostly-Automated Setup

Network Hardware Vulnerabilities Library

The Network Hardware Vulnerabilities Library documents known security vulnerabilities affecting various network devices, including F5, Palo Alto Networks, Citrix NetScaler, SonicWall, Fortinet FortiGate, and Z-Wave devices. It provides structured information on each vulnerability, including CVE identifiers, descriptions, potential impacts, and mitigation recommendations, along with links to official security advisories and research reports. This resource serves as a reference for security professionals, network administrators, and researchers to assess and address critical vulnerabilities in network infrastructure, ensuring timely patching and risk mitigation.


F5

CVE-2022-1388

  • Title: iControl REST Authentication Bypass