28%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
28%
28.11.2023
://google.com"}},
10c7
< "label": "localhost PING/PORT/HTTP Tests",
---
> "label": "opensearch PING/PORT/HTTP Tests",
12,30c9,28
< {
< "type": "PING",
< "params": {
< "hostname": "129
28%
20.06.2012
:root
bin:x:1:root,bin,daemon
daemon:x:2:root,bin,daemon
sys:x:3:root,bin,adm
adm:x:4:root,adm,daemon
tty:x:5:
disk:x:6:root
lp:x:7:daemon,lp
mem:x:8:
kmem:x:9:
wheel:x:10:root
mail:x:12:mail
uucp:x:14
28%
22.05.2012
.x86_64 0:1.9-22.el6_2.1
libacl.x86_64 0:2.2.49-6.el6 libattr.x86_64 0:2.4.44-7.el6 libblkid.x86_64 0:2.17.2-12.4.el6
libcap.x86_64 0
28%
21.08.2012
Xrender.i686 0:0.9.5-1.el6 will be installed
---> Package libselinux.i686 0:2.0.94-5.2.el6 will be installed
---> Package libthai.i686 0:0.1.12-3.el6 will be installed
---> Package pixman.i686 0:0.18.4-1.el6
28%
04.11.2011
-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
### begin ssh
#-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j
28%
12.05.2021
30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97 3.52
nvme0n1 58.80 12.22 17720.47 48.71 230.91 0.01 79.70 0.08 0.42 0.03 0
28%
09.10.2017
= "A pdf file that contains a bad link"
10
11 strings:
12 $pdf_magic = {68 47 77 22}
13 $s_anchor_tag = "<a " ascii"
14 $s_uri = /\(http.+\)/ ascii"
15
16 condition:
17 $pdf_magic at 0 and (#s
28%
02.08.2021
%util
sda 10.91 6.97 768.20 584.64 4.87 18.20 30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97 3.52
nvme0n1 58.80 12.22 17720.47 48.71 230
28%
02.02.2021
5221548db 58 seconds ago 5.67MB
80dc7d447a48 About a minute ago 167MB
alpine 3.9 78a2ce922f86 5 months ago 5.55MB
The command you really