Using dig as a LLMNR or mDNS CLI Lookup utility

computer network dns

I was looking for a LLMNR commandline lookup utility. Actually, dig can do the job quite fine.

Read more…

Surprising shell pathname expansion

computer unix shell

I thought I was understanding pretty well how bash argument processing and various expansions is supposed to behave. Apparently, there are still subtleties which tricks me, sometimes.

Read more…

Remote Code Execution via Cross Site Request Forgery in InternetCube and YunoHost

computer web security yunohost

How I found remote code execution vulnerabilities via CSRF on the administration interfaces of InternetCube applications and of the YunoHost administration interface which would have been used to execute arbitrary code as root. These vulnerabilities were fixed in YunoHost 3.3, OpenVPN Client app 1.3.0. and YunoHost 3.4.

Read more…

My document generation workflow with Markdown, YAML, Jinja2 and WeasyPrint

computer python

I'm not a super fan a WISWYG text editors. They never really do what I want them to and often often do what I don't whan them to. Here's the workflow I'm using to generate simple text documents (resume, cover letters, etc.) from Markdown, YAML and Jinja2 templates.

Read more…

IP address spoofing in order to watch South Park

computer web hack firefox

Trying to bring back some old IP spoofing Firefox extension for watching South Park episodes.

Read more…

More example of argument and shell command injections in browser invocation

computer unix debian security shell

In the previous episode, I talked about some argument and shell command injections vulnerabilities through URIs passed to browsers. Here I'm checkig some other CVEs which were registered at the same time.

Read more…

Argument and shell command injections in browser invocation

computer unix debian security shell

While reading the source of sensible-browser in order to understand how it was choosing which browser to call (and how I could tweak this choice), I found an argument injection vulnerability when handling the BROWSER environment variable. This lead me (and others) to a a few other argument and shell command injection vulnerabilities in BROWSER processing and browser invocation in general.

Read more…

Foo over SSH

Using SSH as a transport for your protocol

computer network ssh unix

A comparison of the different solutions for using SSH2 as a secured transport for protocols/services/applications.

Read more…

Terminal read-only live sharing

computer unix ssh screen

Live sharing a terminal session to another (shared) host over SSH in read-only mode.

Read more…

Page 1 of 5 | | Next page | JSON Feed | Atom Feed