Vuln IOS XE 03.08.06

Security posture via Cisco PSIRT OpenVuln API Platform: iosxe Version: 03.08.06.E Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-info-disclosure-V4BmJBNF Cisco IOS and IOS XE Software Information Disclosure Vulnerability 5.5 CVE-2020-3477 2020-09-24T16:00:00 cisco-sa-ikev2-9p23Jj2a Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerability 7.5 CVE-2020-3230 2020-06-03T16:00:00 cisco-sa-ssh-dos-Un22sd2A Cisco IOS and IOS XE Software Secure Shell Denial of Service Vulnerability 7.

Vuln IOS XE 17.01.01

Security posture via Cisco PSIRT OpenVuln API Platform: iosxe Version: 17.01.01 Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-ios-profinet-dos-65qYG3W5 Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability 7.4 CVE-2020-3512 2020-09-24T16:00:00 cisco-sa-profinet-J9QMCHPB Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability 7.4 CVE-2020-3409 2020-09-24T16:00:00 cisco-sa-xbace-OnCEbyS Cisco IOS XE Software Arbitrary Code Execution Vulnerability 6.

Vuln IOS 15.4(1)SY4

Security posture via Cisco PSIRT OpenVuln API Platform: ios Version: 15.4(1)SY4 Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-info-disclosure-V4BmJBNF Cisco IOS and IOS XE Software Information Disclosure Vulnerability 5.5 CVE-2020-3477 2020-09-24T16:00:00 cisco-sa-ios-bgp-evpn-dos-LNfYJxfF Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability 6.1 CVE-2020-3479 2020-09-24T16:00:00 cisco-sa-tcl-dos-MAZQUnMF Cisco IOS and IOS XE Software Tcl Denial of Service Vulnerability 6.

Vuln IOS 15.2(1)SY5

Security posture via Cisco PSIRT OpenVuln API Platform: ios Version: 15.2(1)SY5 Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-info-disclosure-V4BmJBNF Cisco IOS and IOS XE Software Information Disclosure Vulnerability 5.5 CVE-2020-3477 2020-09-24T16:00:00 cisco-sa-tcl-dos-MAZQUnMF Cisco IOS and IOS XE Software Tcl Denial of Service Vulnerability 6.5 CVE-2020-3201 2020-06-03T16:00:00 cisco-sa-ikev2-9p23Jj2a Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerability 7.

Vuln NXOS 8.2(4)

Security posture via Cisco PSIRT OpenVuln API Platform: nxos Version: 8.2(4) Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-fxos-nxos-cfs-dos-dAmnymbd Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability 8.6 CVE-2020-3517 8.2(6) 2020-08-26T16:00:00 cisco-sa-nxos-pim-memleak-dos-tC8eP7uw Cisco NX-OS Software IPv6 Protocol Independent Multicast Denial of Service Vulnerability 7.5 CVE-2020-3338 8.2(6) 2020-08-26T16:00:00 cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC Cisco IOS, IOS XE, IOS XR, and NX-OS Software One Platform Kit Remote Code Execution Vulnerability 8.

Vuln IOS XE 03.08.09

Security posture via Cisco PSIRT OpenVuln API Platform: iosxe Version: 03.08.09.E Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-info-disclosure-V4BmJBNF Cisco IOS and IOS XE Software Information Disclosure Vulnerability 5.5 CVE-2020-3477 2020-09-24T16:00:00 cisco-sa-cipdos-hkfTZXEx Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities 8.6 CVE-2020-3225 2020-06-03T16:00:00 cisco-sa-ssh-dos-Un22sd2A Cisco IOS and IOS XE Software Secure Shell Denial of Service Vulnerability 7.

Vuln IOS 15.0(2)SE8

Security posture via Cisco PSIRT OpenVuln API Platform: ios Version: 15.0(2)SE8 Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-profinet-J9QMCHPB Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability 7.4 CVE-2020-3409 2020-09-24T16:00:00 cisco-sa-info-disclosure-V4BmJBNF Cisco IOS and IOS XE Software Information Disclosure Vulnerability 5.5 CVE-2020-3477 2020-09-24T16:00:00 cisco-sa-cipdos-hkfTZXEx Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities 8.

Vuln NXOS 6.2(8)

Security posture via Cisco PSIRT OpenVuln API Platform: nxos Version: 6.2(8) Advisory-ID Impact CVSS CVE Fixed with First Published cisco-sa-fxos-nxos-cfs-dos-dAmnymbd Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability 8.6 CVE-2020-3517 7.3(6)D1(1) 2020-08-26T16:00:00 cisco-sa-callhome-cmdinj-zkxzSCY Cisco NX-OS Software Call Home Command Injection Vulnerability 7.2 CVE-2020-3454 6.2(22) 2020-08-26T16:00:00 cisco-sa-nxos-pim-memleak-dos-tC8eP7uw Cisco NX-OS Software IPv6 Protocol Independent Multicast Denial of Service Vulnerability 7.

Openbsd Root Password Recovery

if you ever have to recover your root password … boot> boot -s Enter pathname of shell or RETURN for sh: [ENTER] fsck -p / fsck -p /usr mount -uw / mount /usr passwd and finally: reboot sha256: b95b600be5f4f8c76448bc80699fdf39660be04dd3c92169bbfa16cf61d4f1a8

Smokeping Debian Nginx

Smokeping in 5min, with Dual Stack on Nginx All in one Installer Run it at your own risk … wget https://puffy.nolink.ch/scripts/smokeping_debian3.sh chmod 700 smokeping_debian3.sh ./smokeping_debian3.sh or Setup by Hand Install Packages apt-get install borgbackup curl echoping fcgiwrap fping hping3 htop lynx mlocate mtr nginx rsync smokeping tmate tree tshark unzip vim vnstat wget zip Configure Nginx export MYSITENAME="smokeping.planet.world" wget "https://github.com/vazhnov/smokeping_nginx/raw/master/best.conf" sed -i -- s/smokeping\.example\.com/${MYSITENAME}/g best.conf sudo chown root: best.conf sudo mv best.

Smokeping with IPv4 / IPv6

How to install Smokeping on Debian in 5 Minutes with Dualstack, IPv4 and IPv6 All in one Installer Run it at your own risk … wget https://puffy.nolink.ch/scripts/smokeping_debian2.sh chmod 700 smokeping_debian2.sh ./smokeping_debian2.sh or Setup by Hand Set Hostname root@smokeping:~# cat /etc/hostname smokeping.planet Install Packages apt-get install apache2 borgbackup curl echoping fping hping3 htop ipcalc jq lftp lynx mlocate mtr nmap pwgen rsync sipcalc smokeping tmate tree tshark unzip vim vnstat wget zip Enable Smokeping in Apache cd /etc/apache2/conf-enabled ln -s .

RC3

some cool Movies/Audios from “Remote Chaos Experience” RC3 RC3 Video, ordered by ViewCount Amateurfunk hacken Spot the Surveillance DevOps Disasters 3.1 Elektrogruselkabinet Indien-Edition 36C3 - Boeing 737MAX: Automated Crashes 36C3 - BahnMining - Pünktlichkeit ist eine Zier 36C3 - Finfisher verklagen 36C3 - Hirne Hacken 35C3 - Du kannst alles hacken – du darfst dich nur nicht erwischen lassen 35C3 - Hackerethik - eine Einführung sha256: cd1c96425a71eff438454e590745e28be39661c845aa57793a0b7d1c81f16c56

Checkmk 2.0 Beta

Install Notes checkmk 2.0 (beta) install debian 10.6 upgrade to 10.7 apt-get install dpkg-sig scp check-mk-raw-2.0.0b1_0.buster_amd64.deb ip-of-host:/tmp/ wget https://checkmk.com/support/Check_MK-pubkey.gpg gpg --keyserver keys.gnupg.net --recv-keys 434DAC48C4503261 gpg --armor --export 434DAC48C4503261 > Check_MK-pubkey.gpg gpg --import Check_MK-pubkey.gpg dpkg-sig --verify check-mk-raw-2.0.0b1_0.buster_amd64.deb apt-get install gdebi-core gdebi check-mk-raw-2.0.0b1_0.buster_amd64.deb omd version OMD - Open Monitoring Distribution Version 2.0.0b1.cre omd create mysite omd start mysite http://ip-of-host/mysite/ cmkadmin The admin user for the web applications is cmkadmin with password: xXxXxXx For command line administration of the site, log in with 'omd su mysite'.

Jq

Json Query some basics about JQ … RAW Data cat history.shelly.0.SHEM-3#40F52000B661#1.Total.Current.json | jq '.[0:3]' [ { "val": 2.64, "ack": 1, "ts": 1607900404883, "q": 0, "user": "system.user.admin" }, { "val": 2.61, "ack": 1, "ts": 1607900410483, "q": 0, "user": "system.user.admin" }, { "val": 2.58, "ack": 1, "ts": 1607900416083, "q": 0, "user": "system.user.admin" } ] Query First Record cat history.shelly.0.SHEM-3#40F52000B661#1.Total.Current.json | jq '.[0]' { "val": 2.64, "ack": 1, "ts": 1607900404883, "q": 0, "user": "system.

Wireguard Puffy to OPNsense

WG Tunnel between OpenBSD and OPNsense How to Setup an WG Tunnel between OpenBSD and OPNSense ? That’s quite simple … OpenBSD Install Packages pkg_add wireguard-tools-- Build Interface r=$(openssl rand -base64 32) remote_ip="1.2.3.4" remote_net="192.168.0.0/24" cat << 'EOF' > /etc/hostname.wg0 # WG Tunnel to OPNsense wgkey ${r} wgport 51820 wgpeer xxxxx - PUBLIC-KEY-OF-REMOTE-HOST - xxxxx= wgendpoint ${remote_ip} 51820 wgaip ${remote_net} inet 10.0.0.1/24 !route add ${remote_net} 10.0.0.2 up EOF sh /etc/netstart wg0 ifconfig wg0 update pf.