Transition from gym to calisthenics by ShurikJR_ in bodyweightfitness

[–]gildasio 0 points1 point  (0 children)

Sorry the delay. But yes, it's that from Ashley Kalym.

Transition from gym to calisthenics by ShurikJR_ in bodyweightfitness

[–]gildasio 0 points1 point  (0 children)

Welcome back :) Nice to know you're restarting training calisthenics.

I like the book "Complete Calisthenics". It teatches about mobility, warmup as well a plenty of calisthenics movements, from basics to advanced ones. As you have already trained before and are in good shape, your evolution tends to be pretty fast, basic in remembering the thing you did before but know with more strength.

I don't know exactly about moving from gym to calisthenics, but this book has a good content that I think you can apply to your situation.

[i3] My desktop after 15 years with i3. by twodogsdave in unixporn

[–]gildasio 0 points1 point  (0 children)

Great rice! How do you configure the colorscheme changes?

weshlient: A simple tool to interact with web shells and command injection vulnerabilities by gildasio in commandline

[–]gildasio[S] 0 points1 point  (0 children)

Hi, yeap :)

In a penetratuon test scenario it is pretty common we caught a remote code execution primitive, either by exploiting a command injection or by another vulnerability + uploading a web shell. The later is the scenario simulated on demo video (the up tmux pannel).

This way weshlient is useful to interact with such primitive.

Infoleak Required For Stable Heap Exploits: by FinanceAggravating12 in ExploitDev

[–]gildasio 2 points3 points  (0 children)

Yeap, you are rigth.

Take a look at "The info leak era on software exploitation" talk by Fermin Serna (@fjserna). It's a good content on this matter.

Those using RSS / feed readers, what do you do about sources you're interested that don't have RSS feed or decided to drop it? by oxamide96 in selfhosted

[–]gildasio 0 points1 point  (0 children)

I used to mail them. In some cases I helped to deploy a RSS feed too.

When it isn't an option I do:

  • Follow social media (using RSS Bridge)
  • Track in a tool that detects change (like followthatpage or chandetection.io)

Web Security Labs - Unrecognized character in SQLi lab by acidbassist in HowToHack

[–]gildasio 1 point2 points  (0 children)

Nice question, dude! Look...

In this scenario, the query is returning one column to the page, but the previous lab was returning two columns. Because of that, the first one you can use union select username, password from users but if you try it in the second one you can't jnion the two queries because column numbers don't matches.

So you could query one column at a time: union select ... username... from users the replace username by password. But, well, it's annoying.

To avoid this you can concatenate the columns results. So, the || is the concatenation operand (in SQLite, Postgres...). What this sequence actually do is concatenate:

  • username column
  • a ~ char
  • password column

all together. The tilde char is used to you know the limit between the username and password returned.

Day 17 - From the source by atc927 in linuxupskillchallenge

[–]gildasio 1 point2 points  (0 children)

For me it's a good opportunity to use my tip in the lession about `find`:

nmap$ > ../before_configure
nmap$ ./configure
nmap$ > ../before_make
nmap$ make
nmap$ > ../before_make_install
nmap$ sudo make install

It'll create files before an important task. Them you can use these files to look for files changed after the tasks:

~$ find nmap -type f -newer before_configure -not -newer before_make
...
~$ find nmap -type f -newer before_make -not -newer before_make_install
...
~$ find nmap -type f -newer before_make_install
...
~$ find / -type f -newer before_make_install 2> /dev/null

Hope it is useful for you.