Simon Graf

Results 5 comments of Simon Graf

Hmm, just tried the following: `docker run -d -p 80:80 -v /var/run/docker.sock:/tmp/docker.sock:ro jwilder/nginx-proxy:0.6.0` `docker run -d --expose 80 -e VIRTUAL_HOST=foo.bar.com tutum/hello-world` On the host, i added 127.0.0.1 foo.bar.com to /etc/hosts...

Still curious why the Exploit does not work using a vulnerable nginx-proxy runnning in a docker container.

Additional info: I looked a bit into Usb4Java and was able to retrieve the physical path with the following code: ``` java ByteBuffer path = BufferUtils.allocateByteBuffer(8); result = LibUsb.getPortNumbers(device, path);...

Yeah, this is what I ended up with. I added an Usb4JavaJavaxLibraryWrapper as part of the package org.usb4java.javax and wrote some casting functions like ``` public int getBusNumberFromUsbDevice(UsbDevice usbDevice) {...

I have got the exact same problem. Tried so far `