https://www.sigstore.dev/ ( & cosig https://github.com/sigstore/cosign )
https://in-toto.io/
(cf. red hat trusted software supply chain which actually embeds those open source tools)
+ backstage.io for "platform engineering"
https://www.sigstore.dev/ ( & cosig https://github.com/sigstore/cosign )
https://in-toto.io/
(cf. red hat trusted software supply chain which actually embeds those open source tools)
+ backstage.io for "platform engineering"
required step for a lot of web-based use-case when a cookie must be stored on the client side, for example with oauth2-proxy to set-up remote authentication.
docker run -ti --rm python:3-alpine python -c 'import secrets,base64; print(base64.b64encode(base64.b64encode(secrets.token_bytes(16))));'
Followings solutions are from : https://oauth2-proxy.github.io/oauth2-proxy/docs/configuration/overview (v7.2.x)
python -c 'import os,base64; print(base64.urlsafe_b64encode(os.urandom(32)).decode())'
dd if=/dev/urandom bs=32 count=1 2>/dev/null | base64 | tr -d -- '\n' | tr -- '+/' '-_'; echo
openssl rand -base64 32 | tr -- '+/' '-_'
# Add System.Web assembly to session, just in case
Add-Type -AssemblyName System.Web
[Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes([System.Web.Security.Membership]::GeneratePassword(32,4))).Replace("+","-").Replace("/","_")
# Valid 32 Byte Base64 URL encoding set that will decode to 24 []byte AES-192 secret
resource "random_password" "cookie_secret" {
length = 32
override_special = "-_"
}
Following pegasus revelations, I decided to play a bit with the tool provided by Amnesty International Security Lab in July 2021.
Forensics, long time no see !
Sources : https://github.com/mvt-project/mvt
Doc : https://docs.mvt.re/en/latest/android/download_apks.html
Pretty strait-forward, once you have ADB installed on your computer.
the following steps are for and android phone + mac OS laptop
Step 0 : set your phone in "developper mode". For me I had to go to the settings and press 7 times on the release logo.
Step 1 : plug your phone in USB, enabling USB debugging https://developer.android.com/studio/debug/dev-options#enable%3E
Step 2 : install ADB
brew install android-platform-tools
Check that you see your device, and then stop adb (not required after).
adb devices
adb kill-server
Step 3 : install mvt
pip3 install mvt
Step 4 : run mvt over your phone
mkdir output && mvt-android download-apks --output ./output --all-checks
openssl s_client -showcerts -connect 75.74.58.21:443 <
/dev/null
2>
/dev/null
|
sed
-n
'/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p'
|
grep
-m1 -B-1 --
'-----END CERTIFICATE-----'
> cert.pem
Connect with cert
curl --cacert cert.pem https:
//hostname
.com
wpa_cli
while : ; do sudo wpa_cli wps_pbc any ; sleep 120 ; done &
Source :
Here some of preinstalled apps on Anonymous-OS: - ParolaPass Password Generator - Find Host IP - Anonymous HOIC - Ddosim - Pyloris - Slowloris - TorsHammer - Sqlmap - Havij - Sql Poison - Admin Finder - John the Ripper - Hash Identifier - Tor - XChat IRC - Pidgin - Vidalia - Polipo - JonDo - i2p - Wireshark - Zenmap - ...
protects machines from accidental shutdowns/reboots
The package installs a shell script that overrides the existing shutdown/reboot/halt/poweroff commands and first runs a set of scripts, which all have to exit successfully, before molly-guard invokes the real command.
One of the scripts checks for existing SSH sessions. If any of the four commands are called interactively over an SSH session, the shell script prompts you to enter the name of the host you wish to shut down. This should adequately prevent you from accidental shutdowns and reboots.
This shell script passes through the commands to the respective binaries in /sbin and should thus not get in the way if called non-interactively, or locally.