superfish.pem contains:
- the Superfish certificate as found by both Chris Palmer and Matt Burke;
- the encrypted private key as found by Karl Koscher.
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)| def versions = [] | |
| def f = new File('mock-version-tags.txt') | |
| f.eachLine { versions << it } | |
| def versionComparator = { a, b -> | |
| def VALID_TOKENS = /._/ | |
| a = a.tokenize(VALID_TOKENS) | |
| b = b.tokenize(VALID_TOKENS) | |
| for (i in 0..<Math.max(a.size(), b.size())) { |
superfish.pem contains:
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)| #!/usr/bin/python | |
| # Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
| # Michael Davis ([email protected]) | |
| # Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
| # The author disclaims copyright to this source code. | |
| import select |
| #!/bin/bash | |
| # scrot -> pomf.se, by @__akiaki | |
| SCROTARGS=() | |
| while (( "$#" )); do | |
| if [ "$1" == "--delete" ]; then | |
| DELETE=1 | |
| else | |
| SCROTARGS+=($1) |