16%
30.07.2014
($one, $two, $three) = map { $_ x 4096 } 'a'..'c';
$s .= $one;
$s .= $two;
$s .= $three;
my $temp;
for (my $i=0; $i<12288; $i++) {
$temp=substr($s,length($s)-1,1);
$s=$temp.$s;
$s = substr($s,0,12288);
}
$elapsed
16%
06.10.2019
# Configuration for the seed node DC1N1
04 # The name could stand for datacenter 1, node 1
05 DC1N1:
06 image: cassandra:3.10
07 command: bash -c 'if [ -z "$$(ls -A /var
16%
30.11.2020
runtime is surrounded by confusion and ambiguity. The CRI-O runtime [3] is an Open Container Initiative (OCI)-compliant container runtime. Both runC and Kata Containers are currently supported
16%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
16%
05.12.2014
of pkgsrc; releases 2014Q2 and 2014Q1 are fine):
imgadm install d34c301e-10c3-11e4-9b79-5f67ca448df0
To better understand, take a look at an article published in a previous issue of ADMIN
[5].
First, I
16%
28.06.2011
.part.22
12 Generating manifest /tmp/centos.5- 3.x86.img.manifest.xml
13
14 $ euca- register images/centos.5- 3.x86.img.manifest.xml
15 IMAGE emi- c658102B
When all three parts have been uploaded
16%
20.06.2022
_domains = "*"
# Keycloak configuration
oidc_issuer_url = "http://localhost:8080/realms/testrealm"
provider = "keycloak-oidc"
client_id = "proxy"
client_secret = "t1BmFL4HHk7xC6nPYJEMfiprMfw1QK7b"
# Cookie settings
cookie
16%
02.02.2021
is enabled on that Apache server), such as this entry:
[Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425
I also found a number of WordPress attacks, most commonly
16%
15.02.2012
rewinddir
0
0
0
0
0
0
0
0
fsync
21
21
21
21
21
22
26
31
lseekm
3
16%
26.01.2012
rewinddir
0
0
0
0
0
0
0
0
fsync
21
21
21
21
21
22
26
31
lseekm
3