These are my links for 22 Apr 2016 through 23 Apr 2016:
- How to use Powershell in an exploit · rapid7/metasploit-framework Wiki
PowerShell is a scripting language developed by Microsoft. It provides API access to almost everything in a Windows platform, less detectable by countermeasures, easy to learn, therefore it is incredibly powerful for penetration testing during post exploitation, or exploit development for payload execution. Take Metasploit’s windows/smb/psexec_psh.rb module for example: it mimics the psexec utility from SysInternals, the payload is compressed and executed from the command line, which allows it to be somewhat stealthy against antivirus. There’s only less than 30 lines of code in psexec_psh.rb (excluding the metadata that describes what the module is about), because most of the work is done by the Powershell mixin, nothing is easier than that. The command line will automatically attempt to detect the architecture (x86 or x86_64) that it is being run in, as well as the payload architecture that it contains. If there is a mismatch it will spawn the correct PowerShell architecture to inject the payload into, so there is no need to worry about the architecture of the target system.
- HOWTO use geoiplookup – Fail2ban
You may be interested in a quick summary of the countries where the attacks come from. This document explains how to find these information.
- IP Address Details – ipinfo.io – Simple, reliable, and affordable IP geolocation data.
- Cryptocat – Chat with your friends, privately.Cryptocat is free software with a simple mission: everyone should be able to chat with their friends in privacy.Open source. All Cryptocat software is published transparently.
Encrypted by default. Every message is encrypted, always.
Forward secure. Chats can’t be decrypted even if your keys are stolen.
Multiple devices. All devices linked to your account will receive forward secure messages, even when offline.
File sharing. Securely share files with friends.
Group chat. Chat with multiple buddies at once (coming soon).
These are my links for 24 mar 2015 through 29 mar 2015:
- Candlepin – Home – Candlepin is a collection of tools which allow companies to manage software subscriptions. The subscriptions allow users to access provided content over secure connections.
- Rockhopper VPN: IPsec/IKEv2-based VPN software for Linux, implemented in user space. – Rockhopper VPN is IPsec/IKEv2-based VPN software based on modern design and considerations for Linux. All components of this VPN software are implemented in user space only, including the ESP protocol stack.
- Taiga.Io | Agile, Open Source, Free Project Management System – Free. Open Source. Powerful. Taiga is a project management platform for startups and agile developers & designers who want a simple, beautiful tool that makes work truly enjoyable.
- Git-ftp by git-ftp – I use git-ftp for my script based projects, mostly PHP. Most of the low-cost web hosting companies do not provide SSH or git support, but only FTP. That is why I needed an easy way to deploy my git tracked projects. Instead of transfering the whole project, I thought, why not only transfer the files that changed since the last time, git can tell me those files. Even if you are playing with different branches, git-ftp knows which files are different. No ordinary FTP client can do that. [ via http://onethingwell.org/post/114496962991/git-ftp ]
- IE Supported Cipher Suites · client9/sslassert Wiki · GitHub – Summary: SSL cipher suite support on Internet Explorer depends both on the version of IE and on the version of the operating system. Internet Explorer 8 is crippled if it runs on Windows XP.
These are my links for 2 dic 2014 through 3 dic 2014:
- VPN over SSH – ArchWiki – There are several ways to set up a Virtual Private Network through SSH. Note that, while this may be useful from time to time, it may not be a full replacement for a regular VPN.
- Simplify Your Life With an SSH Config File · Nerderati – If you're anything like me, you probably log in and out of a half dozen remote servers (or these days, local virtual machines) on a daily basis. And if you're even more like me, you have trouble remembering all of the various usernames, remote addresses and command line options for things like specifying a non-standard connection port or forwarding local ports to the remote machine[…]
- SSH Tips and Tricks | [email protected] – This presentation is updated from “SSH Tips and Tricks given on Wed. Feb 28th, 2007