Open ssl.conf in a text editor.
Edit the domain(s) listed under the [alt_names] section so that they match the local domain name you want to use for your project, e.g.
DNS.1 = my-project.dev
Additional FQDNs can be added if required:
| import requests | |
| import sys | |
| import os | |
| PLUGIN = 'credentials' | |
| BACKDIR_COUNT = 10 | |
| if len(sys.argv) != 3: | |
| print 'usage:\n\tpython CVE-2018-1999002.py [jenkins base url] [absolute file path]' | |
| print '' |
| Jenkins.instance.getItemByFullName("manuri/test-build") | |
| .getBuildByNumber(123) | |
| .finish( | |
| hudson.model.Result.ABORTED, | |
| new java.io.IOException("Aborting build") | |
| ); |
| #!/bin/bash | |
| if [ "$#" -ne 3 ]; then | |
| echo "usage: sh thread-analyze.sh <pid> <number-of-dumps> <interval>" | |
| exit | |
| fi | |
| count=$2 | |
| for i in `seq 1 $count`; | |
| do | |
| jstack -l $1 > thread_dump_`date "+%F-%T"`.txt & |
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
For more about AWS and AWS Certifications and updates to this Gist you should follow me @leonardofed
| require 'rubygems' | |
| require 'yaml' | |
| # A demonstration of YAML anchors, references and handling of nested values | |
| # For more info, see: | |
| # http://atechie.net/2009/07/merging-hashes-in-yaml-conf-files/ | |
| stooges = YAML::load( File.read('stooges.yml') ) | |
| # => { | |
| # "default" => { |
| echo "building framework" | |
| cd identity-framework | |
| mvn clean install -Dmaven.test.skip=true | |
| if [ $? -ne 0 ] | |
| then | |
| cd .. | |
| echo Build failed at identity-framework | |
| notify-send "Build failed at identity-framework" | |
| exit 1 | |
| else |
| Use TCPDUMP to Monitor HTTP Traffic | |
| 1. To monitor HTTP traffic including request and response headers and message body: | |
| tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' -i all | |
| 2. To monitor HTTP traffic including request and response headers and message body from a particular source: | |
| tcpdump -A -s 0 'src example.com and tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | |
| 3. To monitor HTTP traffic including request and response headers and message body from local host to local host: |
| #!/usr/bin/env python2 | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
| # The author disclaims copyright to this source code. | |
| import sys | |
| import struct | |
| import socket | |
| import time | |
| import select |