System: Debian/Ubuntu/Fedora. Might work for others as well.
As mentioned here, to update a go version you will first need to uninstall the original version.
To uninstall, delete the /usr/local/go directory by:
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
System: Debian/Ubuntu/Fedora. Might work for others as well.
As mentioned here, to update a go version you will first need to uninstall the original version.
To uninstall, delete the /usr/local/go directory by:
| openssl x509 -inform der -in ca.der -out burp.pem | |
| name=$(openssl x509 -inform PEM -subject_hash_old -in burp.pem | head -1) | |
| cp burp.pem "$name.0" | |
| rm burp.pem | |
| echo "[~] Run using adb: adb push $name.0 /system/etc/security/cacerts/$name.0" |
| # mkdir certificates && cd certificates | |
| sudo apt-get install openssl | |
| cp /usr/lib/ssl/openssl.cnf ./ | |
| openssl req -x509 -days 730 -nodes -newkey rsa:2048 -outform der -keyout server.key -out ca.der -extensions v3_ca -config openssl.cnf | |
| openssl rsa -in server.key -inform pem -out server.key.der -outform der | |
| openssl pkcs8 -topk8 -in server.key.der -inform der -out server.key.pkcs8.der -outform der -nocrypt | |
| rm openssl.cnf | |
| rm server.key | |
| rm server.key.der |
| Exploit/description | Path |
|---|---|
| Microsoft Office Online Server SSRF (relay) | /op/view.aspx |
| CVE-2017-11317 CVE-2019-18935 | /Telerik.Web.Ui.WebResource.axd?type=rau |
| CVE-2017-11317 CVE-2019-18935 | /Telerik.Web.UI.DialogHandler.aspx |
| CVE-2020-17519 | /jobmanager/logs/ |
| CVE-2017-7615 | /verify.php?id=1&confirm_hash= |
| CVE-2018-1000130 | /jolokia |
| CVE-2018-1000130 | /actuator/jolokia |
| leak | /actuator/env |
| # Backup | |
| docker exec CONTAINER /usr/bin/mysqldump -u root --password=root DATABASE > backup.sql | |
| # Restore | |
| cat backup.sql | docker exec -i CONTAINER /usr/bin/mysql -u root --password=root DATABASE | |
利用 NGINX 的 Stream 模塊 sni_preread 功能,可以做到讓 Trojan 和其他網站在同一台機器上共享 443 端口。
| diff --git a/server/server.vala b/server/server.vala | |
| index d3fc39f9..3e4d11b3 100644 | |
| --- a/server/server.vala | |
| +++ b/server/server.vala | |
| @@ -3,7 +3,7 @@ namespace Frida.Server { | |
| private const string DEFAULT_LISTEN_ADDRESS = "127.0.0.1"; | |
| private const uint16 DEFAULT_LISTEN_PORT = 27042; | |
| - private const string DEFAULT_DIRECTORY = "re.frida.server"; | |
| + private const string DEFAULT_DIRECTORY = "re.freeda.server"; |