J'ai besoin d'intimité. Non pas parce que mes actions sont douteuses, mais parce que votre jugement et vos intentions le sont.
5185 links
C'est donc comme ça qu'ils font chez eux...
Sans blague ? On ne s'en serait pas douté...
C'est le principe des roulottes de forains dans les foires, en moins basique il faut bien l'admettre :D
C'est l'ennemi de la créativité, ça ne sert qu'à répliquer ce qui a déjà marché et ne peut conduire qu'à un affadissement ou une homogénéisation des films.
Tout est dit. On est en train de s'orienter doucement mais surement vers une société fade, lisse, et uniforme dans la façon de penser.
Ajoutée à cela, la disparition du sens des mots (cf. la novlangue), l'utilisation massive de l'anglais dans de plus en plus d'aspect de nos vies (internet, sciences, rapports officiels...) et on obtient une pensée unique, lobotomisée...
À lire pour plus tard
Énorme ce site. Permet de faire des tests sur ses propres bases. C'est très formateur.
On a retrouvé la source des discours de macron.
Site officiel pour les thèmes, addons etc. de cinnamon
If you have ever hosted a website or even administrated a server you'll be very well aware of bad people trying bad things with your stuff.
When I first hosted my own little linux box with SSH access at age 13 I read through the logs daily and report the IPs (mostly from China and Russia) who tried to connect to my sweet little box (which was actually an old ThinkPad T21 with a broken display running under my bed) to their ISPs.
Actually if you have a linux server with SSH exposed you can see how many connection attempts are made every day:
grep 'authentication failures' /var/log/auth.log
Hundreds of failed login attempts even though this server has disabled password authentication and runs on a non-standard port
Ok to be honest, web vulnerability scanners have existed before Wordpress but since WP is so widely deployed most web vuln scanners include scans for some misconfigured wp-admin folders or unpatched plugins.
So if a small, new hacking group wants to gain some hot cred they'll download one of these scanner things and start testing against many websites in hopes of gaining access to a site and defacing it.
Sample of a log file during a scan using the tool Nikto
This is why all server or website admins have to deal with gigabytes of logs full with scanning attempts. So I was wondering..
After going through some potential implementations with IDS or Fail2ban I remembered the old ZIP bombs from the old days.
So it turns out ZIP compression is really good with repetitive data so if you have a really huge text file which consists of repetitive data like all zeroes, it will compress it really good. Like REALLY good.
As 42.zip shows us it can compress a 4.5 peta byte (4.500.000 giga bytes) file down to 42 kilo bytes. When you try to actually look at the content (extract or decompress it) then you'll most likely run out of disk space or RAM.
Sadly, web browsers don't understand ZIP, but they do understand GZIP.
So firstly we'll have to create the 10 giga byte GZIP file filled with zeroes. We could make multiple compressions but let's keep it simple for now.
Creating the bomb and checking its size
dd if=/dev/zero bs=1M count=10240 | gzip > 10G.gzip
And for checking file size
du -sh 10G.zip
As you can see it's 10 MB large. We could do better but good enough for now.
Now that we have created this thing, let's set up a PHP script that will deliver it to a client.
<?php
//prepare the client to recieve GZIP data. This will not be suspicious
//since most web servers use GZIP by default
header("Content-Encoding: gzip");
header("Content-Length: ".filesize('10G.gzip'));
//Turn off output buffering
if (ob_get_level()) ob_end_clean();
//send the gzipped file to the client
readfile('10G.gzip');
That's it!
So we could use this as a simple defense like this:
<?php
$agent = filter_input(INPUT_SERVER, 'HTTP_USER_AGENT');
//check for nikto, sql map or "bad" subfolders which only exist on wordpress
if (strpos($agent, 'nikto') !== false || strpos($agent, 'sqlmap') !== false || startswith($url,'wp-') || startswith($url,'wordpress') || startswith($url,'wp/'))
{
sendBomb();
exit();
}
function sendBomb(){
//prepare the client to recieve GZIP data. This will not be suspicious
//since most web servers use GZIP by default
header("Content-Encoding: gzip");
header("Content-Length: ".filesize('10G.gzip'));
//Turn off output buffering
if (ob_get_level()) ob_end_clean();
//send the gzipped file to the client
readfile('10G.gzip');
}
function startsWith($a, $b) {
return strpos($a, $b) === 0;
}
This script obviously is not - as we say in Austria - the yellow of the egg, but it can defend from script kiddies I mentioned earlier who have no idea that all these tools have parameters to change the user agent.
| Client | Result |
|---|---|
| IE 11 | Memory rises, IE crashes |
| Chrome | Memory rises, error shown |
| Edge | Memory rises, then dripps and loads forever |
| Nikto | Seems to scan fine but no output is reported |
| SQLmap | High memory usage until crash |
| Safari | Hight memory usage, then crashes and reloads, then memory rises again, etc.. |
| Chrome (Android) | Memory rises, error shown |
(if you have tested it with other devices/browsers/scripts, please let me know and I'll add it here)
Il faut le lire "Ray parti" alors :)
Et en plus, elle sourit cette conne. Ça va péter, c'est sûr.
Réveillez-vous les gens !!!
Pas ça con ! Mais c'est la fin de toute protection sociale. Tu seras une marchandise dont on pourra se débarrasser quand bon nous semble.
Au moins, avec un CDD, il y a une prime de précarité. Là, rien. Walou. Nada.
Je vous laisse un extrait des conférences de Franck LEPAGE, sur la notion de "Projet" dont les journalistes et invités des différentes émissions prises en exemple se gargarisent : http://www.dailymotion.com/video/xj0yxj_projet_fun
Clippy, le tombone de Microsoft vous manque ? Installer le sur votre site internet ;-)
Via Cochise
Github : https://github.com/smore-inc/clippy.js