ipv6 ressources...
clear but may be outdated? (2002)
Cisco – The ABCs of IP Version 6 - SixXS : https://www.sixxs.net/archive/docs/Cisco%20IPv6%20ABC.pdf
à voir et plus
Think of it as strace + tcpdump + lsof + awesome sauce.
1- http://www.youtube.com/watch?v=rf3U2eRBD7k simple brin, silice 2mm, kanthal 0,20, 7 spires, 2,2Ohm
2- http://www.youtube.com/watch?v=e76AhMAVCxA double brin, silice 3mm? kanthal 0,15???
http://www.youtube.com/watch?v=uwxMqIOeyMw How To: Twisted Kanthal Micro Coil on an Igo-L RDA
The ultimate replacement for spreadsheets, mind mappers, outliners, PIMs, text editors and small databases.
Suitable for any kind of data organization, such as Todo lists, calendars, project management, brainstorming, organizing ideas, planning, requirements gathering, presentation of information, etc.
NOT ONLY FOR GAMING
You can use you Gamebuino as an interface for any electronic system: as a controller, a monitor, a data-logger, a console, or whatever. Connect it with your computer, your 3D printer, or your last robotic project… the only limit is your imagination!
Gamebuino is compatible with any I2C module. You can find some of them from Seeed studio’s Grove system or Tinkerkit.
BlackHat Asia USB Physical Access | NCC Group
Physical access is no longer a requirement to trigger Windows USB bugs
https://www.nccgroup.com/media/481258/usb_physical_access_andy_davis_ncc_group_slides_updated.pdf
LXC Resources
-
http://www.blaess.fr/christophe/2012/01/07/linux-3-2-cfs-cpu-bandwidth-english-version/
-
http://www.janoszen.com/2013/02/06/limiting-linux-processes-cgroups-explained/
-
http://oakbytes.wordpress.com/2012/09/02/cgroup-cpu-allocation-cpu-shares-examples/
-
http://fritshoogland.wordpress.com/2012/12/15/throttling-io-with-linux/
-
https://www.kernel.org/doc/Documentation/filesystems/sharedsubtree.txt
-
http://www.ibm.com/developerworks/library/l-mount-namespaces/
-
http://blog.endpoint.com/2012/01/linux-unshare-m-for-per-process-private.html
-
http://s3hh.wordpress.com/2012/05/10/user-namespaces-available-to-play/
-
http://docs.openstack.org/trunk/config-reference/content/lxc.html
-
libcontainer (de docker.io) https://github.com/dotcloud/docker/tree/master/pkg/libcontainer
http://blog.docker.io/2014/03/docker-0-9-introducing-execution-drivers-and-libcontainer/ -
warden (cloudfoundry aka CF) basé sur cgroup (et non habillage lxc) https://github.com/cloudfoundry/warden/blob/master/README.md
https://groups.google.com/a/cloudfoundry.org/forum/#!topic/vcap-dev/V-lVpMpNqL4
https://docs.google.com/a/gopivotal.com/document/d/1DDBJlLJ7rrsM1J54MBldgQhrJdPS_xpc9zPdtuqHCTI/edit -
google lmctfy - Let Me Contain That For You - https://github.com/google/lmctfy
mais aussi
Vagrant (sur OpenVM) http://www.vagrantup.com/
crack d'un ransomware
encore une VM pour s'entrainer
une solution, pas à pas http://resources.infosecinstitute.com/drunk-admin-web-hacking-challenge/
bien observé :D
Un convertisseur en ligne depuis/vers markdown, html, reStructured Text, DocBook, MediaWiki et quelques autres.
et pour vérifier les droits requis par une application: http://blogs.msdn.com/b/aaron_margosis/archive/2012/11/28/lua-buglight-2-2-with-support-for-windows-8.aspx
tiré de ://www.linkedin.com/groupItem?view=&srchtype=discussedNews&gid=700&item=5844728412626788352&type=member&trk=eml-anet_dig-b_pd-ttl-cn&fromEmail=&ut=0rFj8XrCbOu681
Nous savons qu’à partir de la version 15.0.1 les hash sont générés via SHA-256 mais pour les versions antérieures (<= 12.5), encore très utilisées en entreprise, l’algo utilisé n’a jamais été reversé jusqu’au bout (FEAL-8).
C’est donc le sujet de ce papier qui va permettre via un cas client de développer un module John The Ripper pour les hash de type SYB-PROP
https://hacktivity.com/hu/letoltesek/archivum/57/
http://marcellmajor.com/sybase_sha256.html
bricolage sur pw ASE http://www.sypron.nl/quiz2013a.html
http://www.vulnerabilityassessment.co.uk/sybase.htm
http://www.bossconsulting.com/sybase_dba/sublevels/sybase.security