- Trying to deploy WPA3 on my home network
https://gist.github.com/est31/d92d17acbb4ea152296f9b38764cd791
- NetworkManager 1.16 released, adding WPA3-Personal and WireGuard support
https://blogs.gnome.org/lkundrak/2019/03/15/networkmanager-1-16/
Learning…
https://gist.github.com/est31/d92d17acbb4ea152296f9b38764cd791
https://blogs.gnome.org/lkundrak/2019/03/15/networkmanager-1-16/
https://www.cyberciti.biz/faq/debian-10-set-up-wireguard-vpn-server/
“stateless authentication mechanism as the user state is never saved in the server memory”
https://medium.com/@adrianmihaila/single-sign-on-across-multiple-applications-part-ii-a8a48e4a7c11
FROM alpine:latest RUN apk --no-cache update RUN apk add --no-cache build-base python3 python3-dev py3-pip git libffi libffi-dev openssl openssl-dev bash RUN pip install httpie-edgegrid RUN rm -rf /var/cache/apk/*
Acesse a seguinte pagina e copie a chave publica do MySQL.
https://dev.mysql.com/doc/refman/5.7/en/checking-gpg-signature.html
Salve a chave em um arquivo com o seguinte nome: mysql-pubkey.asc
Agora importe esta chave PGP para dentro do utilitário gnupg, para isto execute o seguinte comando:
$ gpg --import mysql-pubkey.asc
Agora exporte o keyring usando o seguinte comando:
$ gpg --export 5072E1F5 > mysql-keyring.pgp
MetaSploit modulo para Microsoft Server Message Block v1 (CVE-2017-0143)
https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010
CVE-2017-0143
http://www.cvedetails.com/cve/cve-2017-0143
MetaSploit tutorial for beginners
https://jonathansblog.co.uk/metasploit-tutorial-for-beginners
Beginners Guide to Metasploit
https://www.hackthis.co.uk/articles/a-beginners-guide-to-metasploit
Referencias:
=-=from log=-=
Jan 1 12:34:56 hostname sshd[1234]: User myusername not allowed because account is locked
=-=arquivo manifest=-=
user { ‘myusername’:
ensure => present,
password => ‘*’,
}
Referencias: