I hereby claim:
- I am woodrow on github.
- I am woodrow (https://keybase.io/woodrow) on keybase.
- I have a public key whose fingerprint is 7901 C8DB 4886 EB01 4FC7 EBBA 8A10 C01C F186 88B8
To claim this, I am signing this object:
| -- started based on https://gist.github.com/z4yx/218116240e2759759b239d16fed787ca | |
| cbor = Dissector.get("cbor") | |
| iso7816 = Dissector.get("iso7816") | |
| ctaphid_proto = Proto("CTAPHID","FIDO Client to Authenticator Protocol over USB HID") | |
| ctaphidfield_cid = ProtoField.uint32("ctaphid.cid", "Channel ID", base.HEX) | |
| ctaphidfield_cmd = ProtoField.uint8("ctaphid.cmd", "Command", base.HEX) | |
| ctaphidfield_bcnt = ProtoField.uint16("ctaphid.bcnt", "Payload Length", base.DEC_HEX) | |
| ctaphidfield_seq = ProtoField.uint8("ctaphid.seq", "Packet Sequence", base.HEX) |
| kubectl get clusterroles admin --output=json | jq '.rules | map(. as $rule | .apiGroups | map(. as $apiGroup | $rule.resources | map(. as $resource | $rule.verbs | map(. as $verb | $apiGroup + ":" + $resource + ":" + $verb)))) | flatten | sort' > /tmp/admin.json | |
| kubectl get clusterroles edit --output=json | jq '.rules | map(. as $rule | .apiGroups | map(. as $apiGroup | $rule.resources | map(. as $resource | $rule.verbs | map(. as $verb | $apiGroup + ":" + $resource + ":" + $verb)))) | flatten | sort' > /tmp/edit.json | |
| kubectl get clusterroles view --output=json | jq '.rules | map(. as $rule | .apiGroups | map(. as $apiGroup | $rule.resources | map(. as $resource | $rule.verbs | map(. as $verb | $apiGroup + ":" + $resource + ":" + $verb)))) | flatten | sort' > /tmp/view.json | |
| vimdiff /tmp/edit.json /tmp/admin.json | |
| vimdiff /tmp/view.json /tmp/edit.json |
| # check for open ports in security groups | |
| aws ec2 describe-security-groups | jq '.SecurityGroups | map(select(.IpPermissions[] | select(.FromPort >= 443 and .ToPort <= 443))) |
| import argparse | |
| import json | |
| import re | |
| import sys | |
| import uuid | |
| class OpenVPNNetworkConfiguration(object): | |
| KNOWN_CONFIG_KEYS = { | |
| 'name': {'key': 'Name'}, |
| SO SECURE SYSTEM. AMAZE. | |
| UNAUTHORIZED ACCESS MUCH PROHIBITED. | |
| BEWARE OF DOGE. WOW. | |
| ░░░░░░░░░▄░░░░░░░░░░░░░░▄░░░░ | |
| ░░░░░░░░▌▒█░░░░░░░░░░░▄▀▒▌░░░ | |
| ░░░░░░░░▌▒▒█░░░░░░░░▄▀▒▒▒▐░░░ | |
| ░░░░░░░▐▄▀▒▒▀▀▀▀▄▄▄▀▒▒▒▒▒▐░░░ | |
| ░░░░░▄▄▀▒░▒▒▒▒▒▒▒▒▒█▒▒▄█▒▐░░░ | |
| ░░░▄▀▒▒▒░░░▒▒▒░░░▒▒▒▀██▀▒▌░░░ |
I hereby claim:
To claim this, I am signing this object:
| --- ca_certs-10.9.1.txt 2014-02-28 18:24:53.365172328 -0800 | |
| +++ ca_certs-10.9.2.txt 2014-02-28 18:25:18.209171996 -0800 | |
| @@ -1,1 +1,1 @@ | |
| -System Version: OS X 10.9.1 (13B42) | |
| +System Version: OS X 10.9.2 (13C64) | |
| @@ -2132,0 +2132,119 @@ | |
| +Certificate: | |
| + Data: | |
| + Version: 3 (0x2) | |
| + Serial Number: |
| #!/bin/bash | |
| mkdir -p /tmp/ca_certs/ && rm -f /tmp/ca_certs/* | |
| cd /tmp/ca_certs/ | |
| # dump root certs and split on cert boundary (assuming no more than 1000 root certs) | |
| security find-certificate -a -p /System/Library/Keychains/SystemRootCertificates.keychain | csplit -s -k -f ca_cert -n 3 - '/-----BEGIN CERTIFICATE-----/' '{1000}' >/dev/null 2>&1 | |
| # rename the certs based on their openssl subject_hash to ensure the certs are sortable | |
| ls /tmp/ca_certs/ | xargs -n 1 sh -c 'mv $0 $(openssl x509 -hash -noout -in $0)' | |
| # print the OS version in the first line | |
| system_profiler SPSoftwareDataType | grep -o 'System Version.*$' > /tmp/ca_certs.txt | |
| # dump the text of the certs in subject_hash-sorted order into certs.txt |
| # get the SHA-1 digest of the subjectPublicKeyInfo of a certificate as used by Chromium's preloaded public key pinning | |
| # http://src.chromium.org/viewvc/chrome/trunk/src/net/http/transport_security_state_static.h?r1=191212&r2=191211&pathrev=191212 | |
| curl -s https://pki.google.com/GIAG2.crt | openssl x509 -inform der -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha1 | |
| # (stdin)= 43dad630ee53f8a980ca6efd85f46aa37990e0ea | |
| # get the base64-encoded SHA-256 digest of the subjectPublicKeyInfo of a certificate as used by HTTP Public Key Pinning | |
| # (http://tools.ietf.org/html/draft-ietf-websec-key-pinning-11) | |
| curl -s https://pki.google.com/GIAG2.crt | openssl x509 -inform der -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha256 -binary | base64 | |
| # 7HIpactkIAq2Y49orFOOQKurWxmmSFZhBCoQYcRhJ3Y= |
| #!/usr/bin/env ruby | |
| require 'stripe' | |
| Stripe.api_key = 'API_KEY' | |
| customers_by_coupon = {} | |
| customer_count = nil | |
| batch_count = 100 | |
| batch_offset = 0 |