In my never-ending quest to find justification for writing NSM-Console, I hereby present the following tutorial on how to decode the SANS Christmas packet challenge using nothing but NSM-Console: I’m going to be using NSM-Console version 0.4-DEVEL, which adds the features that allow this analysis to be performed without external tools. You can get the […]
Code: #!/usr/bin/env ruby def fisher_yates_shuffle(a) (a.size-1).downto(1) { |i| j = rand(i+1) a[i], a[j] = a[j], a[i] if i != j } end lines = File.open(‘/usr/share/dict/words’).collect fisher_yates_shuffle(lines) lines.each { |word| puts “trying #{word.chomp}…” system(“wget -q #{ARGV[0]}/#{word.chomp}.html”) system(“wget -q #{ARGV[0]}/#{word.chomp}.htm”) system(“wget -q #{ARGV[0]}/#{word.chomp}.php”) sleep(1) } (The “sleep(1)” is so you don’t kill the server with traffic, remove […]