-
-
Stewart Brand: Hippy Godfather of the Interwebs
-
Debugging Bash Scripts with bashdb
For years I’ve been adding a line in bash scripts to echo out a variable here and there. It’s funny how you just accept a workflow like that as “the way.” But when using an IDE for objected oriented languages I’ve always just expected breakpoints and the ability to watch variables when running code from within the IDE. But it never even occurred to me to do that with bash scripts. Then IsaacH at the office told me about an IDE that does that. Looking inside the IDE, it’s piping commands to bashdb. Soooo, bashdb is kinda’ like gdb. You can set breakpoints and print the content of variables when…
-
The History Of The Microphone
-
Getting Started With HubSpot
This was written as a template for onboarding new sellers using HubSpot and getting it connected to Office 365. You will get an invitation to join HubSpot as part of your onboarding at <INSERTCOMPANYNAME>. Follow that link to setup your HubSpot account. Once configured, we’ll want to link your account to your email – so we can see communications with customers via your Office 365 account in HubSpot. To do so, log into HubSpot and click on the <INSERTCOMPANYNAME> icon in the upper right corner of the screen and then select Profile & Preferences. In the left-hand sidebar of the Settings screen, first click on Integrations and second, click on…
-
Tor and Scripting on macOS
Tor, short for The Onion Router, is a tool to anonymize your web traffic. Tor is simple to use and yet incredibly complicated under the hood. You install software, available at www.torproject.org, or a browser extension. Tor routes your data through a bunch of nodes. Each of those computers or routers is only aware of the node in front of or behind it in the communication route and encrypting the next node sent. Since each step is encrypted, these layers of encryption can be considered like a network with layers like an onion. So if each step is partially encrypted, a compromise of any device in the route will still…
-
Query A Jamf Server From Within Slack
This project is a reference implementation to build a Slack interface to Jamf Pro. It could be used for most any REST endpoint though if you wanted to pull the logic for handling the Jamf URI structure. Because I’m still trying to figure out where to hide secrets in slack, it requires an API gateway. I’ll hopefully remove that requirement in a future iteration. If there is a future iteration. It’s really just meant for reference. Add to it, remove from it, mock it, whatevers… <3 Usage Basically you send it a /q followed by an endpoint and it spits out json. Syntax is pretty much as follows: /q As…
-
Use Sidecar With Unsupported Macs
Sidecar is that spiffy new feature that allows you to extend your Mac desktop to an iPad. It’s cool but only officially supports the following devices; Any 27-inch iMac from Late 2015 or newer Any iMac Pro All MacBook Pros since 2016 2018 MacBook Air Early 2016 12-inch MacBook (or newer of course) 2018 Mac mini 2019 Mac Pro Here’s the thing, those limitations are set based on performance of the machine. The /System/Library/PreferencePanes/Sidecar.prefPane actually shows support for a couple of keys that allow you to use Sidecar even if your device isn’t one of these. Buyer beware though, if you end up with performance issues then run the same…
-
Can’t wait for #JNUCF
-
My Metasploit Cheat Sheet
I’ve been using metasploit for a long time, but it’s not something I use daily. So I started a notes doc on it a long time ago. Here’s that doc. <3 The setup (dependencies install mostly via homebrew for Mac or use whatever other dependency/package manager for others): Install homebrew if needed: ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" brew install libxml2,nmap,ruby21 brew install postresql --without-ossp-uuid git clone https://github.com/rapid7/metasploit-framework.git /usr/local/share/metasploit-framework To launch the Metasploit console: ./msfconsole To update: msfupdate From within the console, use the show verb to see a list of all Encoders, NOP Generators, Exploits, and Payloads: show To just show payloads: Show payloads Set your exploit (from the list…