# HG changeset patch # User mb # Date 1367683426 14400 # Node ID 70c307de9b84938c8942132a4cc724335939a71b initial commit. basic scripts diff -r 000000000000 -r 70c307de9b84 ait/poc/misc/benchmark.bash --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/ait/poc/misc/benchmark.bash Sat May 04 12:03:46 2013 -0400 @@ -0,0 +1,7 @@ +#!/bin/bash +START=$(date +%s) +$1 +END=$(date +%s) +DIFF=$(( $END - $START)) +echo "it took $DIFF seconds" + diff -r 000000000000 -r 70c307de9b84 ait/poc/nfs/exports --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/ait/poc/nfs/exports Sat May 04 12:03:46 2013 -0400 @@ -0,0 +1,2 @@ +/export 10.137.2.9/24(rw,fsid=0,insecure,no_subtree_check,async) +/export/user 10.137.2.9/24(rw,nohide,insecure,no_subtree_check,async) diff -r 000000000000 -r 70c307de9b84 ait/poc/nfs/hosts.allow --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/ait/poc/nfs/hosts.allow Sat May 04 12:03:46 2013 -0400 @@ -0,0 +1,11 @@ +# +# hosts.allow This file contains access rules which are used to +# allow or deny connections to network services that +# either use the tcp_wrappers library or that have been +# started through a tcp_wrappers-enabled xinetd. +# +# See 'man 5 hosts_options' and 'man 5 hosts_access' +# for information on rule syntax. +# See 'man tcpd' for information on tcp_wrappers +# +rcpbind mountd nfsd statd lockd rquotad : 10.137.2.9 diff -r 000000000000 -r 70c307de9b84 ait/poc/nfs/nfs_history_scanner --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/ait/poc/nfs/nfs_history_scanner Sat May 04 12:03:46 2013 -0400 @@ -0,0 +1,231 @@ + 1 top + 2 gpk-update-viewer + 3 top + 4 :q + 5 top + 6 yum update + 7 sudo yum update + 8 sudo yum install clamav-scanner + 9 sudo yum install clamav-update + 10 freshclam + 11 vim /etc/freshclam.conf + 12 vim /etc/freshclam.conf sud + 13 sudo vim /etc/freshclam.conf + 14 freshclam + 15 sudo freshclam + 16 ls + 17 exit + 18 sudo yum install clamav + 19 sudo freshclam + 20 clamav + 21 clamscan + 22 freshclam + 23 sudo freshclam + 24 ls /mnt/ + 25 ls /mnt/removable/ + 26 yum update + 27 sudo yum update + 28 ifconfig + 29 ifconfig eth0 down + 30 sudo ifconfig eth0 down + 31 sudo ifconfig eth0 up + 32 ifconfig + 33 sudo yum update + 34 ping opengl.org + 35 sudo yum search nfs + 36 sudo yum help + 37 sudo yum check-update + 38 ps -ax | grep yum + 39 kill 943 + 40 sudo kill 943 + 41 sudo yum check-update + 42 ps -ax | grep yum + 43 kill -9 943 + 44 sudo kill -9 943 + 45 sudo kill -9 949 + 46 sudo kill -9 942 + 47 ps -ax | grep yum + 48 sudo yum check-update + 49 sudo yum search nfs + 50 sudo yum install nfs-utils + 51 sudo yum install nfsserver + 52 sudo yum install nfs-server + 53 sudo yum search all nfs + 54 sudo yum install nfs-utils.x86_64 + 55 dmesg -H + 56 vim /etc/profile.d/colorls.sh + 57 sudo vim /etc/profile.d/dmesg-h.sh + 58 vim /etc/profile.d/colorls.sh + 59 ls -la /etc/profile.d/colorls.sh + 60 ls -la /etc/profile.d/dmesg-h.sh + 61 sudo exec /etc/profile.d/dmesg-h.sh + 62 sudo exec -c /etc/profile.d/dmesg-h.sh + 63 exec + 64 exec --help + 65 alias dmesg="dmesg --human" + 66 dmesg + 67 ls /etc/exports + 68 cat /etc/exports + 69 ls + 70 mkdir Exports + 71 ls + 72 ifconfig + 73 sudo vim /etc/exports + 74 /etc/init.d/network restart + 75 sudo /etc/init.d/network restart + 76 exportfs -ra + 77 sudo exportfs -ra + 78 ls + 79 echo "test text" > ./Exports/test.txt + 80 ls + 81 sudo cat /etc/exports + 82 ifconfig + 83 exportfs -ra + 84 sudo exportfs -ra + 85 sudo /etc/init.d/network restart + 86 sudo exportfs -ra + 87 ifconfig + 88 sudo cat /etc/exports + 89 sudo vim /etc/exports + 90 sudo exportfs -ra + 91 ifconfig + 92 iptables -I INPUT 5 -p tcp --dport 2049 -m state --state NEW -j ACCEPT + 93 sudo iptables -I INPUT 5 -p tcp --dport 2049 -m state --state NEW -j ACCEPT + 94 sudo iptables -I INPUT 5 -p tcp --dport 2049 -j ACCEPT + 95 sudo iptables -I INPUT 5 -p udp --dport 2049 -j ACCEPT + 96 iptables + 97 iptables -l + 98 iptables -h + 99 ls /etc/init.d/ + 100 /etc/init.d/README + 101 sudo /etc/init.d/README + 102 sudo cat /etc/init.d/README + 103 systemctl + 104 systemctl | grep nfs + 105 service nfs-server start + 106 sudo service nfs-server start + 107 exportfs -ra + 108 sudo exportfs -ra + 109 sudo vim /etc/exports + 110 sudo exportfs -ra + 111 sudo service nfs-server restart + 112 cat /etc/hosts.allow + 113 sudo vim /etc/hosts.allow + 114 ls + 115 chmod 777 Exports/ + 116 chmod 777 Exports + 117 sudo service nfs-server restart + 118 sudo exportfs -ra + 119 sudo vim /etc/hosts.allow + 120 sudo service nfs-server restart + 121 sudo exportfs -ra + 122 sudo vim /etc/exports + 123 sudo exportfs -ra + 124 mkdir -p /export/users + 125 sudo mkdir -p /export/users + 126 mv /export/users/ /export/user ; sudo mount --bind /home/user /export/user + 127 sudo mv /export/users/ /export/user ; sudo mount --bind /home/user /export/user + 128 ls /export/ + 129 sudo vim /etc/exports + 130 sudo exportfs -ra + 131 ifconfig + 132 service nfs-kernel-server restart + 133 sudo service nfs-kernel-server restart + 134 sudo service nfs-server restart + 135 sudo iptables -A INPUT -s 10.137.2.9 -d 10.137.2.16 111 -p 6 -j ACCEPT + 136 sudo iptables -A INPUT -s 10.137.2.9 -d 0/0 111 -p 6 -j ACCEPT + 137 sudo iptables -A INPUT -s 10.137.2.9 -d 0/0 --dport 111 -p 6 -j ACCEPT + 138 sudo iptables -I INPUT 5 -p tcp --dport 111 -j ACCEPT + 139 history | grep iptables + 140 sudo iptables -I INPUT 5 -p udp --dport 111 -j ACCEPT + 141 sudo iptables -I INPUT 5 -p udp --dport 32765:32768 -j ACCEPT + 142 sudo iptables -I INPUT 5 -p tcp --dport 32765:32768 -j ACCEPT + 143 service portmap restart + 144 sudo service portmap restart + 145 sudo service portmap.service restart + 146* sudo service portmap start + 147 statd -p 32765 -o 32766 + 148 sudo find / -name portmap* + 149 portmap -d + 150 sudo service nfs-server restart + 151 service portmap restart + 152 sudo service portmap restart + 153 sudo yum search portmap + 154 exportfs -a -v + 155 sudo exportfs -a -v + 156 iptabled -L -n + 157 iptables -L -n + 158 sudo iptables -L -n + 159 sudo iptables -I INPUT 5 -s 10.137.2.9 -p tcp --dport 32765:32768 -j ACCEPT + 160 sudo iptables -I INPUT 5 -s 10.137.2.9 -p udp --dport 32765:32768 -j ACCEPT + 161 sudo iptables -I INPUT 5 -s 10.137.2.9 -p udp --dport 2049 -j ACCEPT + 162 sudo iptables -I INPUT 5 -s 10.137.2.9 -p tcp --dport 2049 -j ACCEPT + 163 sudo iptables -I INPUT 5 -s 10.137.2.9 -p tcp --dport 111 -j ACCEPT + 164 sudo iptables -I INPUT 5 -s 10.137.2.9 -p udp --dport 111 -j ACCEPT + 165 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p tcp --dport 2049 -j ACCEPT + 166 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p udp --dport 2049 -j ACCEPT + 167 ifconfig + 168 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p udp --dport 2049 -j ACCEPT + 169 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p tcp --dport 2049 -j ACCEPT + 170 sudo iptables -L -n + 171 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p tcp --dport 20048 -j ACCEPT + 172 sudo iptables -I INPUT 5 -s 10.137.2.9 -d 10.137.2.16 -p udp --dport 20048 -j ACCEPT + 173 sudo iptables -L -n + 174 uname + 175 uname -a + 176 host + 177 host -l + 178 sudo iptables -L -n + 179 sudo iptables -D INPUT -s 10.137.2.9 -p udp --dport 111 + 180 sudo iptables -D INPUT -s 10.137.2.9 -d 0.0.0.0 -p udp --dport 111 + 181 sudo iptables -L -n + 182 sudo iptables -D INPUT 10 + 183 sudo iptables -L -n + 184 sudo iptables -D INPUT 10 + 185 sudo iptables -L -n + 186 sudo iptables -D INPUT 10 + 187 sudo iptables -L -n + 188 sudo iptables -D INPUT 10 + 189 sudo iptables -L -n + 190 sudo iptables -D INPUT 9 + 191 sudo iptables -L -n + 192 sudo iptables -A INPUT 8 -s 10.137.2.9 -p udp --dport 111 + 193 sudo iptables -A INPUT 7 -s 10.137.2.9 -p udp --dport 111 + 194 sudo iptables -A INPUT 5 -s 10.137.2.9 -p udp --dport 111 + 195 sudo iptables -I INPUT 8 -s 10.137.2.9 -p udp --dport 111 + 196 sudo iptables -L -n + 197 sudo iptables -D INPUT 8 + 198 sudo iptables -L -n + 199 sudo iptables -I INPUT 9 -s 10.137.2.9 -p udp --dport 111 -j ACCEPT + 200 sudo iptables -L -n + 201 /etc/init.d/network restart + 202 sudo /etc/init.d/network restart + 203 sudo iptables -L -n + 204 sudo iptables -I INPUT 9 -s 10.137.2.9 -p tcp --dport 111 -j ACCEPT + 205 sudo iptables -D INPUT 6 + 206 sudo iptables -L -n + 207 sudo iptables -D INPUT 7 + 208 sudo iptables -L -n + 209 sudo iptables -D INPUT 8 + 210 sudo iptables -L -n + 211 sudo iptables -D INPUT 7 + 212 sudo iptables -I INPUT 7 -s 10.137.2.9 -p udp --dport 111 -j ACCEPT + 213 sudo iptables -L -n + 214 sudo iptables -I INPUT 7 -s 10.137.2.9 -p udp --dport 111 -j ACCEPT + 215 sudo iptables -I INPUT 7 -s 10.137.2.9 -p tcp --dport 111 -j ACCEPT + 216 sudo iptables -L -n + 217 sudo iptables -D INPUT 8 + 218 sudo iptables -L -n + 219 sudo iptables -D INPUT 7 + 220 sudo iptables -L -n + 221 sudo iptables -I INPUT 7 -s 10.137.2.9 -d 10.137.2.16 -p tcp --dport 111 -j ACCEPT + 222 sudo iptables -L -n + 223 sudo iptables -I INPUT 7 -s 10.137.2.9 -d 10.137.2.16 -p udp --dport 111 -j ACCEPT + 224 sudo iptables -L -n + 225 sudo iptables -D INPUT 7 + 226 sudo iptables -L -n + 227 sudo iptables -I INPUT 7 -s 10.137.2.9 -d 10.137.2.16 -p udp --dport 111 -j ACCEPT + 228 sudo iptables -L -n + 229 cat /etc/hosts.allow + 230 sudo cat /etc/exports + 231 history > ./nfs_history_scanner diff -r 000000000000 -r 70c307de9b84 ait/poc/truecrypt/create_crypto_volume.sh --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/ait/poc/truecrypt/create_crypto_volume.sh Sat May 04 12:03:46 2013 -0400 @@ -0,0 +1,10 @@ +#!/bin/bash +truecrypt -c $1 --password="" --volume-type=normal --filesystem=none --encryption=aes --size="33554432" --hash=SHA-512 --random-source=/dev/urandom -k "./key.txt" --non-interactive +truecrypt --protect-hidden=no -k "./key.txt" --password="" --filesystem=none $1 +truecrypt -l +sudo mkfs.ext3 /dev/mapper/truecrypt1 +truecrypt -d $1 +rm -rf ./encrypted +mkdir ./encrypted +truecrypt --protect-hidden=no -k "./key.txt" --password="" $1 ./encrypted/ +ls ./encrypted diff -r 000000000000 -r 70c307de9b84 ait/poc/truecrypt/key.txt Binary file ait/poc/truecrypt/key.txt has changed