You found that you are using systemd, adding bits to GRUB will not work. Instead, follow these steps:
Open the /etc/kernel/cmdline file for editing:
nano /etc/kernel/cmdline
| // Paste these lines into website's console (Win/Linux: Ctrl + Shift + I / Mac: Cmd + Alt + I) | |
| if(!!window.React || | |
| !!document.querySelector('[data-reactroot], [data-reactid]') || | |
| Array.from(document.querySelectorAll('*')).some(e => e._reactRootContainer !== undefined || Object.keys(e).some(k => k.startsWith('__reactContainer'))) | |
| ) | |
| console.log('React.js'); | |
| if(!!document.querySelector('script[id=__NEXT_DATA__]')) | |
| console.log('Next.js'); |
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
| #requires -version 5 | |
| function New-InMemoryModule | |
| { | |
| Param | |
| ( | |
| [Parameter(Position = 0)] | |
| [ValidateNotNullOrEmpty()] | |
| [String] | |
| $ModuleName = [Guid]::NewGuid().ToString() |
| FROM tensorflow/tensorflow:1.13.2-py3 | |
| ENV DEBIAN_FRONTEND=noninteractive | |
| RUN apt update -y && apt upgrade -y && apt install git -y | |
| RUN git clone https://github.com/openai/gpt-2 /gpt-2 | |
| WORKDIR /gpt-2 | |
| RUN python3 -m pip install --upgrade pip && python3 -m pip install -r requirements.txt | |
| RUN python3 download_model.py 124M |
| // dllmain.cpp : Defines the entry point for the DLL application. | |
| #include "pch.h" | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #define _CRT_SECURE_NO_DEPRECATE | |
| #pragma warning (disable : 4996) | |
| // generated with sharpdllproxy. |
Short HOWTO about setting up Full Disk Encryption with unattended auto-unlock using TPM2 on Kali.
Useful for rogue devices (auto-connecting to C2), headless pentest boxes, etc. storing confidential information but lacking physical security.
NOTE: In order to maintain integrity and protect the encryption key, hardening the boot process with Secure Boot is a must. For making Secure Boot work (without messing up the default UEFI keys stored in the hardware), the Microsoft-signed UEFI shim loader is used (available in the Kali repo) which is able to load securely an arbitrary ELF image as 2nd stage