vault backup: 2022-03-03 14:25:45

This commit is contained in:
Daniel Bulant 2022-03-03 14:25:45 +01:00
parent 5f7031f2c1
commit 638254a034
12 changed files with 107 additions and 4 deletions

View file

@ -12,8 +12,8 @@
"checkpointList": [
{
"path": "/",
"date": "2022-03-02",
"size": 798483
"date": "2022-03-03",
"size": 800369
}
],
"activityHistory": [
@ -490,7 +490,11 @@
},
{
"date": "2022-03-02",
"value": 361
"value": 1421
},
{
"date": "2022-03-03",
"value": 826
}
]
}

View file

@ -91,3 +91,11 @@ HR manager - looks after personnel and their conditions for employment - recruit
4. don't think, think
---
1. Ereys
2. from a friend
3. 1998
4. he sent cakes
5. cakes
6. chocolate cake
7. 14000$
8. 5000 t-shirts

View file

@ -0,0 +1,8 @@
---
tags: [ele, testy]
Day: 2022-03-14
---
# 14.3 opakování
Ohmův zákon
P Výkon
W Práce

View file

@ -0,0 +1,5 @@
---
tags: [ele, testy]
Day: 2022-03-17
---
# 17.3. Test

View file

@ -7,6 +7,8 @@ type: folder_brief_live
imagePrefix: 'data/'
```
%% Zoottelkeeper: Beginning of the autogenerated index file list %%
- [[ele/Testy/14.3 opakování|14.3 opakování]]
- [[ele/Testy/17.3. Test|17.3. Test]]
- [[ele/Testy/Oprava rezistorů|Oprava rezistorů]]
- [[ele/Testy/Pololetní opakování|Pololetní opakování]]
%% Zoottelkeeper: End of the autogenerated index file list %%

View file

@ -2,6 +2,7 @@
tags:
- kbb
- command
- tldr.sh
cmd: sqlmap
arch-repo: Community repositories
---
@ -13,4 +14,24 @@ SQL injection tool
sqlmap -u <URL> --wizard
```
Spustí SQL injection na dané URL.
Spustí SQL injection na dané URL.
```
sqlmap
Detect and exploit SQL injection flaws.More information: https://sqlmap.org.
- Run sqlmap against a single target URL:
python sqlmap.py -u "{{http://www.target.com/vuln.php?id=1}}"
- Send data in a POST request (--data implies POST request):
python sqlmap.py -u "{{http://www.target.com/vuln.php}}" --data="{{id=1}}"
- Change the parameter delimiter (& is the default):
python sqlmap.py -u "{{http://www.target.com/vuln.php}}" --data="{{query=foobar;id=1}}" --param-del="{{;}}"
- Select a random User-Agent from ./txt/user-agents.txt and use it:
python sqlmap.py -u "{{http://www.target.com/vuln.php}}" --random-agent
- Provide user credentials for HTTP protocol authentication:
python sqlmap.py -u "{{http://www.target.com/vuln.php}}" --auth-type {{Basic}} --auth-cred "{{testuser:testpass}}"
```

View file

@ -1,3 +1,10 @@
---
tags:
- kbb
- command
- tldr.sh
cmd: arp-scan
---
# arp-scan
```
Send ARP packets to hosts (specified as IP addresses or hostnames) to scan the local network. More information: https://github.com/royhills/arp-scan.

View file

@ -0,0 +1,8 @@
---
tags:
- kbb
- command
- tldr.sh
cmd: arpspoof
---
# arpspoof

View file

@ -1,3 +1,10 @@
---
tags:
- kbb
- command
- tldr.sh
cmd: nmap
---
# nmap
Network map

View file

@ -8,6 +8,7 @@ imagePrefix: 'data/'
```
%% Zoottelkeeper: Beginning of the autogenerated index file list %%
- [[kbb/tools/arp-scan|arp-scan]]
- [[kbb/tools/arpspoof|arpspoof]]
- [[kbb/tools/nmap|nmap]]
- [[kbb/tools/SQLMap|SQLMap]]
%% Zoottelkeeper: End of the autogenerated index file list %%

31
notes/mat/Nerovnice.md Normal file
View file

@ -0,0 +1,31 @@
# Nerovnice
## Příklady
---
$$\frac{x-2}3 \leq 1 | *3$$
$$x-2\leq3|+2$$
$$x\leq5$$
$$K = \{(-\infty; 5>\}$$
---
$$\frac{x-2}{-5}\leq1|*-5$$
$$x-2\geq-5$$
$$x-2\geq-5|+2$$
$$x\geq-3$$
$$k=\{<-3;\infty)\}$$
---
nulový bod..$-3$
$[x\gt-3]$
$$\frac{x-2}{x+3}\leq1|*(x+3)$$
$$x-2\leq1(x+3)$$
$$x-2\leq x+3 | -x+2$$
$$0 \leq 5$$
$$x \in <-3;\infty)$$
$[x\lt-3]$
$$\frac{x-2}{x+3}\leq 1$$
$$x-2\geq1(x+3)$$
$$x-2\geq x+3 |-x+2$$
$$0\geq5$$
$$x=\emptyset$$

View file

@ -20,6 +20,7 @@ imagePrefix: 'data/'
- [[mat/Množiny|Množiny]]
- [[mat/Mocniny|Mocniny]]
- [[mat/Násobek a dělitel|Násobek a dělitel]]
- [[mat/Nerovnice|Nerovnice]]
- [[mat/Příklady|Příklady]]
- [[mat/Rovnice|Rovnice]]
- [[mat/Rozklad složených čísel na součin prvočísel|Rozklad složených čísel na součin prvočísel]]