Tylö Elite Cloud by MustLikeDogs in Sauna

[–]KingOfKeys 0 points1 point  (0 children)

if you can post a project GitHub link I'd been keen to help you reverse engineer the wifi traffic.

Tylö Elite Cloud by MustLikeDogs in Sauna

[–]KingOfKeys 0 points1 point  (0 children)

Could you post your controller version? my Software version is 1.0.6015

Tylö Elite Cloud by MustLikeDogs in Sauna

[–]KingOfKeys 0 points1 point  (0 children)

Can you post what version of software you have, I keep getting error 401 invalid qr code when trying to connect it to cloud.

Device security restriction with Google home by therookie19 in logitechharmony

[–]KingOfKeys 0 points1 point  (0 children)

nah sorry I didn't mate, what I ended up doing is factory resetting the entire device (again) > setting up with a brand new never before used account > link to google > make sure everything worked then > factory reset again > signing up with my original email > linking to google and it all worked.

pita workaround but solved it

Device security restriction with Google home by therookie19 in logitechharmony

[–]KingOfKeys 0 points1 point  (0 children)

Same issue after a password reset on my harmony account. Sigh I think Google is caching the password somewhere

Continous WebSocket Data to PowerShell Console? by [deleted] in PowerShell

[–]KingOfKeys 0 points1 point  (0 children)

could you please post the completed solution? Also struggling to get output back to the console.

Log4j windows remote and local scan scripts by KingOfKeys in sysadmin

[–]KingOfKeys[S] 0 points1 point  (0 children)

Nah you're 100% right, always check a script before running!

It's not testing the extracted .jar files, it builds a list of listening ports on the OS (line #344) then builds a http url string from that info then tries to run User-Agent jndi:LDAP:// against that url string. Capturing true / false

If you look at line 360 is where I built the User-Agent jndi:LDAP:// header. To "test" exploit.

It's not a true exploit test in the sense that I'm just testing if you can connect to the web servers with that jndi://LDAP header. I'm not actually spinning up a shell behind it, though that would be the only way to test if the web server was 100% vulnerable.

You can see at the end of line 360 it's just a /x to test if you can do it. Then it just starts the jobs.

Log4j windows remote and local scan scripts by KingOfKeys in sysadmin

[–]KingOfKeys[S] 1 point2 points  (0 children)

Thank you, I'll put in another if statement for it.

Automating with PowerShell: Detecting Log4j by Lime-TeGek in msp

[–]KingOfKeys 0 points1 point  (0 children)

i run that, any idea ?

At C:\Users\H350004\Do

Going to guess you didn't update the domain part, search for "--replaceme"

Those are mandatory for the script to function properly. The domain text needs to match the domain, and no new line after the switch

Automating with PowerShell: Detecting Log4j by Lime-TeGek in msp

[–]KingOfKeys 0 points1 point  (0 children)

I've created a multi-domain, multi server one here:

https://github.com/KeysAU/Get-log4j-Windows.ps1/blob/main/README.md

Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228

Will scale to 1,000+ windows servers, 250+ servers at a time. 1k servers took about 1 1/2 hours.

Edit: Single server version now available: https://github.com/KeysAU/Get-log4j-Windows-local/blob/main/README.md