![]() □□ Excited to announce that I've cleared the eLearnSecurity Certified Exploit Developer exam! An intense 5-day certification process that tested my skills in Windows and Linux Exploitation across both x32 and 圆4 architectures. ![]() I'm sure we could have set a max time for it, but a better way was to just have the script itself kill burp after $x seconds. We just backgrounded the headless burp, but it seems like newer versions of ansible keep track of child processes started by the script and won't move to the next step until all processes are done. Speaking of Burp, we also build a really bad bash script to run Burp in headless mode so we can grab the certificate. Then go and install Jython and JRuby, so we can easily install extensions from the bapp store. The github repo ( ), features a slightly different version of the bash script as the one shown in the video wasn't compatible with later versions of ansible. So I had combined jinja2 and powershell to make a dynamic script to set all of that up. If this series with Parrot is a hit, maybe I'll dig up some of the old scripts to showcase how I used ansible in the past, so be sure to comment/share this!Īnyways back to the video - We used jinja2 to help us modify the Firefox Policies file, which allowed us to install extensions and trust the BurpSuite CA. For example, when building Active Directory Labs for learning Kerboasting, I had a lot of trouble trying to configure ansible modules to introduce some vulnerabilities. This is a really powerful technique that opens the doors to a lot of customizations. The next installment in my setting up Parrot with Ansible series is now up! This one is all about configuring BurpSuite and Firefox, the primary purpose of this one was to showcase Jinja2 Templating. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |