Unterstütze uns! Spende jetzt!

Benutzer:Uk/Notizen

Aus PiratenWiki
Wechseln zu: Navigation, Suche

root exploit linux kernel

schneller erster Fix für debian 5.0.3 lenny:
# echo "vm.mmap_min_addr = 4096" > /etc/sysctl.d/mmap_min_addr.conf
# /etc/init.d/procps restart


einfaches Skript für LF-Check

#!/bin/bash
KEY=XXXXXXXXXXXXX
NEWFILE=lfnew.txt
OLDFILE=lfold.txt
mv $NEWFILE $OLDFILE 2>/dev/null
wget -q -O $NEWFILE https://lqpp.de/bb/api/initiative.html?key=$KEY
diff -Nua $OLDFILE $NEWFILE                             

kvm

$ virt-install --connect qemu:///system --name debiantest --ram 512 --disk path=/tmp/demo.img,size=2 --network=bridge:br0 --vnc --os-type=linux --os-variant=debianlenny --cdrom /tmp/debian-507-amd64-netinst.iso --accelerate --noautoconsole

$ virsh -c qemu:///system vncdisplay debiantest

$ ssh -L 5910:localhost:5901 root@localhost

$ vncviewer localhost:10

mime type check abstellen (für zip etc.)

$wgVerifyMimeType = false;

http://www.mediawiki.org/wiki/Manual:$wgVerifyMimeType

Auszug Konfiguration Bundeswiki

#$wgVerifyMimeType = false;

$wgMimeTypeBlacklist= array(
	# HTML may contain cookie-stealing JavaScript and web bugs
	'text/html', 'text/javascript', 'text/x-javascript',  'application/x-shellscript',
	# PHP scripts may execute arbitrary code on the server
	'application/x-php', 'text/x-php',
	# Other types that may be interpreted by some servers
	'text/x-python', 'text/x-perl', 'text/x-bash', 'text/x-sh', 'text/x-csh',
	# Windows metafile, client-side vulnerability on some systems
	'application/x-msmetafile',
	# A ZIP file may be a valid Java archive containing an applet which exploits the
	# same-origin policy to steal cookies
	# Wir brauchen aber .zip
	#'application/zip',
);

duplicity mit gpg-key

$ duplicity --encrypt-key 0xXXXXX --gpg-options "--homedir /path/to/gnupghome --trust-model always" source_directory target_url