1- Docker Download
yum install -y epel-release
yum install -y yum-utils
yum-config-manager --add-repo=https://download.docker.com/linux/centos/docker-ce.repo
| # setup cura 5 on ubuntu 22.04 with mesa opengl | |
| # 1. unpack appimage | |
| ./Ultimaker-Cura-5.0.0-linux.AppImage --appimage-extract | |
| cd ./squashfs-root | |
| # 2. fix "dri not found" | |
| # libGL error: MESA-LOADER: failed to open crocus: /usr/lib/dri/crocus_dri.so: cannot open shared object | |
| # file: No such file or directory (search paths /usr/lib/x86_64-linux-gnu/dri:\$${ORIGIN}/dri:/usr/lib/dri, suffix _dri) |
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault is primarily used in production environments to manage secrets. Vault is a complex system that has many different pieces. There is a clear separation of components that are inside or outside of the security barrier. Only the storage backend and the HTTP API are outside, all other components are inside the barrier.
Figure 1: Architecture of Vault and Spring App (Click to enlarge)
The storage backend is untrusted and is used to durably store encrypted data. When the Vault server is started, it must be provided with a storage backend so that data is available across restarts. The HTTP API similarly must be started by the Vault server on start so that clients can interact with it.
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| from xml.etree.ElementTree import Element, tostring | |
| def dict_to_xml(tag: str, d: dict) -> str: | |
| """ | |
| Converts a Python dictionary to an XML tree, and then returns | |
| it as a string. | |
| Works with recursively nested dictionaries! | |
| "tag" is the name of the top-level XML tag. | |
| """ | |
| elem = Element(tag) |
| // A very rough x64 POC for spoofing environment variables similar to argument spoofing with a focus on | |
| // setting the COMPlus_ETWEnabled=0 var for disabling ETW in .NET. | |
| // | |
| // Works by launching the target process suspended, reading PEB, updates the ptr used to store environment variables, | |
| // and then resuming the process. | |
| // | |
| // (https://blog.xpnsec.com/hiding-your-dotnet-complus-etwenabled/) | |
| #define INJECT_PARAM L"COMPlus_ETWEnabled=0\0\0\0" | |
| #define INJECT_PARAM_LEN 43 |
| package main | |
| import ( | |
| "crypto" | |
| "crypto/rand" | |
| "crypto/rsa" | |
| "crypto/sha256" | |
| "encoding/base64" | |
| "fmt" | |
| ) |
| const simulated_latitude = 48.8534 | |
| const simulated_longitude = 2.3488 | |
| Java.perform(function(){ | |
| const Location = Java.use('android.location.Location') | |
| var location = Location.$new("gps") | |
| location.setLatitude(simulated_latitude) | |
| location.setLongitude(simulated_longitude) |
| package main | |
| import "fmt" | |
| func main() { | |
| fmt.Println("hello world") | |
| } |