<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Maheshwaran M</title>
    <description>The latest articles on DEV Community by Maheshwaran M (@mahesh1706).</description>
    <link>https://dev.to/mahesh1706</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F863839%2F07fb191b-ee77-4891-988e-86cebece7840.jpg</url>
      <title>DEV Community: Maheshwaran M</title>
      <link>https://dev.to/mahesh1706</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mahesh1706"/>
    <language>en</language>
    <item>
      <title>Meilisearch</title>
      <dc:creator>Maheshwaran M</dc:creator>
      <pubDate>Wed, 27 Jul 2022 17:04:33 +0000</pubDate>
      <link>https://dev.to/mahesh1706/meilisearch-30ja</link>
      <guid>https://dev.to/mahesh1706/meilisearch-30ja</guid>
      <description>&lt;p&gt;Features&lt;br&gt;
Search-as-you-type experience (answers &amp;lt; 50 milliseconds)&lt;br&gt;
Full-text search&lt;br&gt;
Typo tolerant (understands typos and misspelling)&lt;br&gt;
Faceted search and filters&lt;br&gt;
Supports hanzi (Chinese characters)&lt;br&gt;
Supports synonyms&lt;br&gt;
Easy to install, deploy, and maintain&lt;br&gt;
Whole documents are returned&lt;br&gt;
Highly customizable&lt;br&gt;
RESTful API&lt;/p&gt;

&lt;p&gt;Getting started&lt;br&gt;
Deploy the Server&lt;br&gt;
Homebrew (Mac OS)&lt;br&gt;
brew update &amp;amp;&amp;amp; brew install meilisearch&lt;br&gt;
meilisearch&lt;br&gt;
Docker&lt;br&gt;
docker run -p 7700:7700 -v "$(pwd)/meili_data:/meili_data" getmeili/meilisearch&lt;br&gt;
Announcing a cloud-hosted Meilisearch&lt;br&gt;
Join the closed beta by filling out this form.&lt;/p&gt;

&lt;p&gt;Try Meilisearch in our Sandbox&lt;br&gt;
Create a Meilisearch instance in Meilisearch Sandbox. This instance is free, and will be active for 48 hours.&lt;/p&gt;

&lt;p&gt;Run on Digital Ocean&lt;br&gt;
DigitalOcean Marketplace&lt;/p&gt;

&lt;p&gt;Deploy on Platform.sh&lt;br&gt;
Deploy on Platform.sh&lt;br&gt;
APT (Debian &amp;amp; Ubuntu)&lt;br&gt;
echo "deb [trusted=yes] &lt;a href="https://apt.fury.io/meilisearch/"&gt;https://apt.fury.io/meilisearch/&lt;/a&gt; /" &amp;gt; /etc/apt/sources.list.d/fury.list&lt;br&gt;
apt update &amp;amp;&amp;amp; apt install meilisearch-http&lt;br&gt;
meilisearch&lt;br&gt;
Download the binary (Linux &amp;amp; Mac OS)&lt;br&gt;
curl -L &lt;a href="https://install.meilisearch.com"&gt;https://install.meilisearch.com&lt;/a&gt; | sh&lt;br&gt;
./meilisearch&lt;br&gt;
Compile and run it from sources&lt;br&gt;
If you have the latest stable Rust toolchain installed on your local system, clone the repository and change it to your working directory.&lt;/p&gt;

&lt;p&gt;git clone &lt;a href="https://github.com/meilisearch/meilisearch.git"&gt;https://github.com/meilisearch/meilisearch.git&lt;/a&gt;&lt;br&gt;
cd meilisearch&lt;br&gt;
cargo run --release&lt;br&gt;
Create an Index and Upload Some Documents&lt;br&gt;
Let's create an index! If you need a sample dataset, use this movie database. You can also find it in the datasets/ directory.&lt;/p&gt;

&lt;p&gt;curl -L &lt;a href="https://docs.meilisearch.com/movies.json"&gt;https://docs.meilisearch.com/movies.json&lt;/a&gt; -o movies.json&lt;br&gt;
Now, you're ready to index some data.&lt;/p&gt;

&lt;p&gt;curl -i -X POST '&lt;a href="http://127.0.0.1:7700/indexes/movies/documents"&gt;http://127.0.0.1:7700/indexes/movies/documents&lt;/a&gt;' \&lt;br&gt;
  --header 'content-type: application/json' \&lt;br&gt;
  --data-binary @movies.json&lt;br&gt;
Search for Documents&lt;br&gt;
In command line&lt;br&gt;
The search engine is now aware of your documents and can serve those via an HTTP server.&lt;/p&gt;

&lt;p&gt;The jq command-line tool can greatly help you read the server responses.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;curl '&lt;a href="http://127.0.0.1:7700/indexes/movies/search?q=botman+robin&amp;amp;limit=2"&gt;http://127.0.0.1:7700/indexes/movies/search?q=botman+robin&amp;amp;limit=2&lt;/a&gt;' | jq&lt;br&gt;
{&lt;br&gt;
  "hits": [&lt;br&gt;
    {&lt;br&gt;
      "id": "415",&lt;br&gt;
      "title": "Batman &amp;amp; Robin",&lt;br&gt;
      "poster": "&lt;a href="https://image.tmdb.org/t/p/w1280/79AYCcxw3kSKbhGpx1LiqaCAbwo.jpg"&gt;https://image.tmdb.org/t/p/w1280/79AYCcxw3kSKbhGpx1LiqaCAbwo.jpg&lt;/a&gt;",&lt;br&gt;
      "overview": "Along with crime-fighting partner Robin and new recruit Batgirl, Batman battles the dual threat of frosty genius Mr. Freeze and homicidal horticulturalist Poison Ivy. Freeze plans to put Gotham City on ice, while Ivy tries to drive a wedge between the dynamic duo.",&lt;br&gt;
      "release_date": 866768400&lt;br&gt;
    },&lt;br&gt;
    {&lt;br&gt;
      "id": "411736",&lt;br&gt;
      "title": "Batman: Return of the Caped Crusaders",&lt;br&gt;
      "poster":&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;"&lt;a href="https://image.tmdb.org/t/p/w1280/GW3IyMW5Xgl0cgCN8wu96IlNpD.jpg"&gt;https://image.tmdb.org/t/p/w1280/GW3IyMW5Xgl0cgCN8wu96IlNpD.jpg&lt;/a&gt;",&lt;br&gt;
      "overview": "Adam West and Burt Ward returns to their iconic roles of Batman and Robin. Featuring the voices of Adam West, Burt Ward, and Julie Newmar, the film sees the superheroes going up against classic villains like The Joker, The Riddler, The Penguin and Catwoman, both in Gotham City… and in space.",&lt;br&gt;
      "release_date": 1475888400&lt;br&gt;
    }&lt;br&gt;
  ],&lt;br&gt;
  "nbHits": 8,&lt;br&gt;
  "exhaustiveNbHits": false,&lt;br&gt;
  "query": "botman robin",&lt;br&gt;
  "limit": 2,&lt;br&gt;
  "offset": 0,&lt;br&gt;
  "processingTimeMs": 2&lt;br&gt;
}&lt;br&gt;
Use the Web Interface&lt;br&gt;
We also deliver an out-of-the-box web interface in which you can test Meilisearch interactively.&lt;/p&gt;

&lt;p&gt;You can access the web interface in your web browser at the root of the server. The default URL is &lt;a href="http://127.0.0.1:7700"&gt;http://127.0.0.1:7700&lt;/a&gt;. All you need to do is open your web browser and enter Meilisearch’s address to visit it. This will lead you to a web page with a search bar that will allow you to search in the selected index.&lt;/p&gt;

&lt;p&gt;| See the gif above&lt;/p&gt;

&lt;p&gt;Documentation&lt;br&gt;
Now that your Meilisearch server is up and running, you can learn more about how to tune your search engine in the documentation.&lt;/p&gt;

&lt;p&gt;Contributing&lt;br&gt;
Hey! We're glad you're thinking about contributing to Meilisearch! Feel free to pick an issue labeled as good first issue, and to ask any question you need. Some points might not be clear and we are available to help you!&lt;/p&gt;

&lt;p&gt;Also, we recommend following the CONTRIBUTING to create your PR.``&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Metasploit from Exploit-DB</title>
      <dc:creator>Maheshwaran M</dc:creator>
      <pubDate>Wed, 27 Jul 2022 16:59:40 +0000</pubDate>
      <link>https://dev.to/mahesh1706/metasploit-from-exploit-db-5ddp</link>
      <guid>https://dev.to/mahesh1706/metasploit-from-exploit-db-5ddp</guid>
      <description>&lt;p&gt;All this time you were just using mainstream exploits which were famous but old. They worked well, but only with old unpatched operating systems, not the updated ones. Now it's time to move on to the next step. Our poor experience against Windows 8 and Java 7u60 left us shattered, and we realized that fully patched and updated machines with strong antivirus and firewall can be pretty  hard to break into. Now we will move into the world of real pentesting, and the first step would be introduction to exploit-db.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Xg3PYrFh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oxu4b0tab35d1ps71wzk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Xg3PYrFh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oxu4b0tab35d1ps71wzk.png" alt="Image description" width="811" height="281"&gt;&lt;/a&gt;&lt;br&gt;
Exploit-db&lt;br&gt;
As usual, a few official words from the developers before I express my personal views.&lt;/p&gt;

&lt;p&gt;The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. (offensive security)&lt;br&gt;
Some more&lt;br&gt;
The Exploit Database is a CVE-Compatible Database and (where applicable) CVE numbers are assigned to the individual exploit entries in the database. The public database archive does not contain the mapped CVE numbers, but we make them available to our partnering organizations, making links to The Exploit Database entries available within their products.&lt;br&gt;
As many exploit developers lament, it is frequently more difficult to locate a vulnerable application than it is to take a public proof of concept and change it into a working exploit. For this reason, The Exploit Database also hosts the vulnerable application versions whenever possible.&lt;br&gt;
In addition, the team of volunteers that maintain the site also make every effort to verify the submitted exploits and a visual indicator is provided whether or not a successful verification was performed. (Offensive Security)&lt;/p&gt;

&lt;p&gt;Now, what exploit db really is, is nothing more than a database where the pentestors who write an exploit for a vulnerability upload the source code of the exploit of other pentestors too see. It is maintained by Offensive Security (the force behind Backtrack, Kali, Metasploit Unleashed). The exploit-db.com site itself is pretty easy to navigate, and you can find all sorts of exploits there. Just finding an exploit, however, is not enough, as you need to add it to Metasploit in order to use it.&lt;/p&gt;

&lt;p&gt;Get the exploit&lt;br&gt;
For examples sake, we'll use the adobe shader exploit from &lt;a href="http://www.exploit-db.com/exploits/33333/"&gt;http://www.exploit-db.com/exploits/33333/&lt;/a&gt; Click on the Save icon to download the exploit. Save it on you Kali Desktop&lt;/p&gt;

&lt;p&gt;Add new exploits to Metasploit from Exploit-db&lt;br&gt;
By  Shashwat  June 09, 2014  cli, command line, denial of service, exploit, exploit-db, hacking, linux, metasploit, Penetration Testing Tutorials, tutorial&lt;br&gt;
Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate&lt;br&gt;
All this time you were just using mainstream exploits which were famous but old. They worked well, but only with old unpatched operating systems, not the updated ones. Now it's time to move on to the next step. Our poor experience against Windows 8 and Java 7u60 left us shattered, and we realized that fully patched and updated machines with strong antivirus and firewall can be pretty  hard to break into. Now we will move into the world of real pentesting, and the first step would be introduction to exploit-db.&lt;/p&gt;

&lt;p&gt;(If you don't want the theory and just want to know how to use the exploits, keep scrolling till you see bold text, some of which is in red and/or blue. Just keep using those commands and you'll be done or click here to skip to that part)&lt;/p&gt;

&lt;p&gt;Exploit-db&lt;br&gt;
As usual, a few official words from the developers before I express my personal views.&lt;/p&gt;

&lt;p&gt;The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. (offensive security)&lt;br&gt;
Some more&lt;br&gt;
The Exploit Database is a CVE-Compatible Database and (where applicable) CVE numbers are assigned to the individual exploit entries in the database. The public database archive does not contain the mapped CVE numbers, but we make them available to our partnering organizations, making links to The Exploit Database entries available within their products.&lt;br&gt;
As many exploit developers lament, it is frequently more difficult to locate a vulnerable application than it is to take a public proof of concept and change it into a working exploit. For this reason, The Exploit Database also hosts the vulnerable application versions whenever possible.&lt;br&gt;
In addition, the team of volunteers that maintain the site also make every effort to verify the submitted exploits and a visual indicator is provided whether or not a successful verification was performed. (Offensive Security)&lt;/p&gt;

&lt;p&gt;Now, what exploit db really is, is nothing more than a database where the pentestors who write an exploit for a vulnerability upload the source code of the exploit of other pentestors too see. It is maintained by Offensive Security (the force behind Backtrack, Kali, Metasploit Unleashed). The exploit-db.com site itself is pretty easy to navigate, and you can find all sorts of exploits there. Just finding an exploit, however, is not enough, as you need to add it to Metasploit in order to use it.&lt;/p&gt;

&lt;p&gt;Adobe Flash Player Shader Buffer Overflow&lt;/p&gt;

&lt;p&gt;This module exploits a buffer overflow vulnerability in Adobe Flash Player. The vulnerability occurs in the flash.Display.Shader class, when setting specially crafted data as its bytecode, as exploited in the wild in April 2014. This module has been tested successfully on IE 6 to IE 11 with Flash 11, Flash 12 and Flash 13 over Windows XP SP3, Windows 7 SP1 and Windows 8. (rapid7)&lt;br&gt;
Now the site suggest that the exploit can be found here.&lt;br&gt;
exploit/windows/browser/adobe_flash_pixel_bender_bof&lt;br&gt;
But using the command&lt;br&gt;
use exploit/windows/browser/adobe_flash_pixel_bender_bof&lt;br&gt;
shows that the exploit is not in Metasploit yet (chances are good it's there if you update metasploit regularly or if you are reading this tutorial a long time after it was written. Either ways, the method will not differ even if the exploit is already there, so don't worry. Also you can use a different exploit as per your liking, and just replace the name wherever you see it being used in commands)&lt;/p&gt;

&lt;p&gt;Now, there are two alternates. First, update the metasploit framework using &lt;/p&gt;

&lt;p&gt;msfupdate&lt;br&gt;
This will update the framework with new modules.&lt;/p&gt;

&lt;p&gt;The second alternate the to download the exploit from exploit-db, then put it in the ~/.msf4/modules/exploit/ directory. Any exploit put here will be detected my Metasploit when it starts. It will show up when you type use /exploit/your_folder/exploit_name. An important point here is while the &amp;lt;your_folder is arbitrary  and can be set to any value, it is recommended to use a proper directory structure. For example, this exploit should be placed in ~/.msf4/modules/exploit/windows/browser/ directory .Also, it is mandatory to place exploits in a subdirectory of ~/.msf4/modules/exploit/ or you won't be able to use it. For newbies in Linux, here is a detailed step by step guide.&lt;/p&gt;

&lt;p&gt;Get the exploit&lt;br&gt;
For examples sake, we'll use the adobe shader exploit from &lt;a href="http://www.exploit-db.com/exploits/33333/"&gt;http://www.exploit-db.com/exploits/33333/&lt;/a&gt; Click on the Save icon to download the exploit. Save it on you Kali Desktop.&lt;/p&gt;

&lt;p&gt;.msf4 directory method&lt;br&gt;
Now if you are not well versed with linux, you will need help with creating the directory and placing files there. Although I'm guiding you how to do it, you should be proficient in linux usage and should be able to do the basic stuff like this atleast. So, you can either use the command to line create the directories or do it using the GUI.&lt;br&gt;
Command line method&lt;br&gt;
First, say hi to mkdir&lt;br&gt;
mkdir --help&lt;br&gt;
Usage: mkdir [OPTION]... DIRECTORY...&lt;br&gt;
Create the DIRECTORY(ies), if they do not already exist.&lt;/p&gt;

&lt;p&gt;Mandatory arguments to long options are mandatory for short options too.&lt;br&gt;
  -m, --mode=MODE   set file mode (as in chmod), not a=rwx - umask&lt;br&gt;
  -p, --parents     no error if existing, make parent directories as needed&lt;br&gt;
  -v, --verbose     print a message for each created directory&lt;br&gt;
  -Z, --context=CTX  set the SELinux security context of each created&lt;br&gt;
                      directory to CTX&lt;br&gt;
      --help     display this help and exit&lt;br&gt;
      --version  output version information and exit&lt;/p&gt;

&lt;p&gt;First we'll move to the already existent directory using (you need to be in root directory for this to work. Type just cd if unsure, it will automatically take you to root directory)root@kali:~# cd .msf4/modules/&lt;br&gt;&lt;br&gt;
To see what the directory has, execute ls. It will return nothing as the directory is empty.&lt;br&gt;
root@kali:~/.msf4/modules# ls&lt;br&gt;
Now we'll use mkdir to create what we need.&lt;br&gt;
root@kali:~/.msf4/modules# mkdir exploits&lt;br&gt;
root@kali:~/.msf4/modules# cd exploits&lt;br&gt;
root@kali:~/.msf4/modules/exploits# mkdir windows&lt;br&gt;&lt;br&gt;
root@kali:~/.msf4/modules/exploits# cd windows&lt;br&gt;
root@kali:~/.msf4/modules/exploits/windows# mkdir browser&lt;br&gt;
root@kali:~/.msf4/modules/exploits/windows# cp      &lt;/p&gt;

&lt;p&gt;If you read the mkdir help thing, you might have noticed the -p option. It makes everything much easier. Everything above can be achieved with something as simple as &lt;br&gt;
root@kali:~# mkdir -p ~/.msf4/modules/exploits/windows/browser&lt;/p&gt;

&lt;p&gt;Now meet cp&lt;br&gt;
root@kali:~/.msf4/modules/exploits/windows# cp --help&lt;br&gt;
Usage: cp [OPTION]... [-T] SOURCE DEST&lt;br&gt;
  or:  cp [OPTION]... SOURCE... DIRECTORY&lt;br&gt;
  or:  cp [OPTION]... -t DIRECTORY SOURCE...&lt;br&gt;
Copy SOURCE to DEST, or multiple SOURCE(s) to DIRECTORY.&lt;br&gt;
Assume you have adobe_flash_pixel_bender_bof.rb file on your desktop. Then use the following commands.&lt;br&gt;
root@kali:~/Desktop# cp adobe_flash_pixel_bender_bof.rb ~/.msf4/modules/exploits/windows&lt;/p&gt;

&lt;p&gt;root@kali:~# ls &lt;br&gt;
Desktop  app.apk&lt;br&gt;
root@kali:~# cd Desktop&lt;br&gt;
root@kali:~/Desktop# cp adobe_flash_pixel_bender_bof.rb ~/.msf4/modules/exploits/windows/browser&lt;br&gt;
Now check for yourself&lt;br&gt;
root@kali:~# cd ~/.msf4/modules/exploits/windows/browser&lt;br&gt;
root@kali:~/.msf4/modules/exploits/windows/browser# ls&lt;br&gt;
adobe_flash_pixel_bender_bof.rb&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
