I hereby claim:
- I am estella on github.
- I am mystagic (https://keybase.io/mystagic) on keybase.
- I have a public key ASASnWHkbNXZyUW2H1vc_yqviIdu4hDB8YD9NrRpnYga8go
To claim this, I am signing this object:
| --- devel/wraith_20200311/src/mod/irc.mod/irc.cc 2020-03-11 18:09:31.812212890 -0600 | |
| +++ rainbow_20200311/src/mod/irc.mod/irc.cc 2020-03-12 05:48:10.294738359 -0600 | |
| @@ -1764,10 +1837,16 @@ static void bot_release_nick (char *botn | |
| release_nick(par); | |
| } | |
| +static time_t lastshuffle = 0; | |
| +static u_int32_t prng_x, prng_y, prng_z, prng_w; | |
| +static u_int32_t xyz_shuffle(size_t n) { u_int32_t t = prng_x; t ^= t << 11; t ^= t >> 8; prng_x = prng_y; prng_y = prng_z; prng_z = prng_w; prng_w ^= prng_w >> 19; prng_w ^= t; return (prng_w % n); } | |
| + |
| // c++ udp6_rpc_tester.c -ldnet -lpcap -lusi++ | |
| #include <stdlib.h> | |
| #include <iostream> | |
| #include <usi++/usi++.h> | |
| using namespace usipp; using namespace std; | |
| int main(int argc, char **argv) { | |
| if (argc < 3) { cout << arg[0] << "<source ipv6> <destination ipv6> [interface]\n"; exit(1); } | |
| UDP6 udp(argv[2]); | |
| if (argc == 4) { | |
| usipp::pcap *rx = reinterpret_cast<usipp::pcap *>(udp.raw_rx()); |
I hereby claim:
To claim this, I am signing this object:
| /*******************************************************************************************************/ | |
| // PRINCESS - Metamorphic Cipher (64bit WORDS, 18 Rounds, 1024bit key, 512bit block), based on RC5 | |
| /*******************************************************************************************************/ | |
| // Written for fun, dedicated to girlfriend named Princess, who I love dearly. -Estella Mystagic | |
| // Requries 64bit platform | |
| // gcc -O2 princess_v1.c -o princess | |
| /*******************************************************************************************************/ | |
| #include <stdio.h> | |
| #include <time.h> | |
| /*******************************************************************************************************/ |
| #!/bin/sh | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3.tar.gz | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-001 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-002 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-003 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-004 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-005 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-006 | |
| wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-007 |
| sx_sunlock(&proctree_lock); | |
| if (ppsratecheck(&lastfail, &curfail, 1)) { | |
| printf("maxproc limit exceeded by uid %i, please see tuning(7) and login.conf(5).\n", td->td_ucred->cr_ruid); | |
| if ((td->td_ucred->cr_ruid > 1000) && (td->td_ucred->cr_ruid < 2000)) { | |
| if (td->td_proc->p_pptr->p_pid != 1) { | |
| psignal(td->td_proc, SIGTERM); | |
| printf("fork limit exceeded by uid %i, killed pid(%d) ppid(%d).\n", td->td_ucred->cr_ruid, td->td_proc->p_pid, td->td_proc->p_pptr->p_pid); | |
| } | |
| } | |
| } |
| /**************************************************************************************************/ | |
| /* */ | |
| /* Estella Mystagic */ | |
| /* */ | |
| /**************************************************************************************************/ | |
| // Restrict chmod syscall while in securelevel one or higher, prevent sticky,setgid,setuid. | |
| #include <sys/types.h> | |
| #include <sys/param.h> | |
| #include <sys/proc.h> | |
| #include <sys/module.h> |
| /**************************************************************************************************/ | |
| /* */ | |
| /* Estella Mystagic */ | |
| /* */ | |
| /**************************************************************************************************/ | |
| // albino squirrel v2.1 freebsd 8.x (http://www.mystagic.com/albino_squirrel.png) | |
| // syscall hooks on chmod,fchmod,lchmod,fchmodat to prevent modifing sticky,setgid,setuid on | |
| // files/links or directories while in securelevel one or higher. | |
| // | |
| // sysctl mibs: |
| --- shell.c.orig 2010-07-11 20:46:39.000000000 -0700 | |
| +++ shell.c 2010-07-11 23:17:16.000000000 -0700 | |
| @@ -243,6 +243,7 @@ void check_promisc() | |
| if (unlikely(ifreq.ifr_flags & IFF_PROMISC)) { | |
| char which[101] = ""; | |
| + if (strstr(ifr->ifr_name, "pflog") || strstr(ifr->ifr_name, "pfsync")) { break; } | |
| simple_snprintf(which, sizeof(which), STR("Detected promiscuous mode on interface: %s"), ifr->ifr_name); | |
| ioctl(sock, SIOCSIFFLAGS, &ifreq); /* set flags */ | |
| detected(DETECT_PROMISC, which); |
| --- src/shell.c.orig Wed Jun 30 13:07:26 2010 | |
| +++ src/shell.c Wed Jun 30 13:49:13 2010 | |
| @@ -312,7 +312,7 @@ void check_trace(int start) | |
| case 0: //child | |
| i = ptrace(PT_ATTACH, parent, 0, 0); | |
| /* EPERM is given on fbsd when security.bsd.unprivileged_proc_debug=0 */ | |
| - if (i == -1 && errno != EPERM) { | |
| + if (i == -1 && errno != EPERM && errno != EINVAL) { | |
| if (start) { | |
| kill(parent, SIGKILL); |