Additional PHP modules that should be installed
apt-get install -y memcached
apt-get install -y php7.*-tidy php-memcached
phpenmod memcached
phpenmod tidy
systemctl restart apache2
Additional PHP modules that should be installed
apt-get install -y memcached
apt-get install -y php7.*-tidy php-memcached
phpenmod memcached
phpenmod tidy
systemctl restart apache2
sysctl -w net.ipv4.ip_local_port_range="15000 61000"
sysctl -w net.ipv4.tcp_fin_timeout=30
sysctl -w net.ipv4.tcp_tw_recycle=1
sysctl -w net.ipv4.tcp_tw_reuse=1
sysctl -w net.ipv4.icmp_ratelimit=0
nmap -A -sS -sU -Pn -p- -T4 address
Cos this question is just plain tiring to do
picoCTF{zerozerozerozero}
Something that I do often, so I’m keeping them here for easy access.
Printer on Level 1 Technical Services: psts, pstsb, pstsc
Printer on B1: psc011, psc008
Same as USP printers, but choose the correct IP address.
Simple way to prevent hotlinking via referer fields in the HTTP Request.
(Does not block crafted requests)
{
"Version": "2008-10-17",
"Id": "",
"Statement": [
{
"Sid": "Allow in my domains",
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::imsj-wordpress/*",
"Condition": {
"StringLike": {
"aws:Referer": "https://imsj.dev/*"
}
}
},
{
"Sid": "Deny access if referer is not my sites",
"Effect": "Deny",
"Principal": {
"AWS": "*"
},
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::imsj-wordpress/*",
"Condition": {
"StringNotLike": {
"aws:Referer": "https://imsj.dev/*"
}
}
}
]
}