Platform LSF Command Reference Chapter 1

Total Page:16

File Type:pdf, Size:1020Kb

Platform LSF Command Reference Chapter 1 Platform LSF Version 9 Release 1.2 Command Reference SC27-5305-02 Platform LSF Version 9 Release 1.2 Command Reference SC27-5305-02 Note Before using this information and the product it supports, read the information in “Notices” on page 459. First edition This edition applies to version 9, release 1 of IBM Platform LSF (product number 5725G82) and to all subsequent releases and modifications until otherwise indicated in new editions. Significant changes or additions to the text and illustrations are indicated by a vertical line (|) to the left of the change. If you find an error in any Platform Computing documentation, or you have a suggestion for improving it, please let us know. Send your suggestions, comments and questions to the following email address: [email protected] Be sure include the publication title and order number, and, if applicable, the specific location of the information about which you have comments (for example, a page number or a browser URL). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1992, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. bacct ...........1 Chapter 26. blimits .........153 Chapter 2. badmin ..........15 Chapter 27. blinfo .........157 Chapter 3. bapp ...........31 Chapter 28. blkill ..........163 Chapter 4. bbot ...........37 Chapter 29. blparams ........165 Chapter 5. bchkpnt .........39 Chapter 30. blstat .........167 Chapter 6. bclusters .........41 Chapter 31. bltasks .........177 Chapter 7. bconf ..........45 Chapter 32. blusers .........181 Chapter 8. bdc ...........53 Chapter 33. bmgroup ........185 || Chapter 9. bentags .........61 Chapter 34. bmig ..........187 Chapter 10. bgadd ..........65 Chapter 35. bmod .........189 Chapter 11. bgdel ..........67 Chapter 36. bpost .........201 Chapter 12. bgmod .........69 Chapter 37. bparams ........205 Chapter 13. bgpinfo .........71 Chapter 38. bpeek .........207 Chapter 14. bhist ..........77 Chapter 39. bqueues ........209 Chapter 15. bhosts .........89 Chapter 40. bread .........225 Chapter 16. bhpart .........101 Chapter 41. brequeue ........227 Chapter 17. bjdepinfo ........103 Chapter 42. bresize .........231 Chapter 18. bjgroup ........105 Chapter 43. bresources .......233 Chapter 19. bjobs .........109 Chapter 44. brestart.........237 Chapter 20. bkill ..........135 Chapter 45. bresume ........239 Chapter 21. bladmin ........141 Chapter 46. brlainfo.........241 Chapter 22. blaunch ........145 Chapter 47. brsvadd ........243 Chapter 23. blcollect ........147 Chapter 48. brsvdel .........249 Chapter 24. blcstat .........149 Chapter 49. brsvmod ........251 Chapter 25. blhosts .........151 Chapter 50. brsvs .........257 © Copyright IBM Corp. 1992, 2013 iii Chapter 51. brun ..........259 Chapter 77. lsinfo .........383 Chapter 52. bsla ..........263 Chapter 78. lsload .........385 Chapter 53. bslots .........269 Chapter 79. lsloadadj ........391 Chapter 54. bstatus .........271 Chapter 80. lslogin .........393 Chapter 55. bstop .........273 Chapter 81. lsltasks.........395 Chapter 56. bsub ..........277 Chapter 82. lsmake .........397 Chapter 57. bswitch ........323 Chapter 83. lsmon .........403 Chapter 58. btop ..........327 Chapter 84. lspasswd ........407 Chapter 59. bugroup ........329 Chapter 85. lsplace .........409 Chapter 60. busers .........331 Chapter 86. lsrcp ..........411 Chapter 61. ch ...........333 Chapter 87. lsrtasks ........415 Chapter 62. fmtpasswdfile ......337 Chapter 88. lsrun ..........417 || Chapter 63. gpolicyd ........339 Chapter 89. lstcsh .........421 Chapter 64. lsacct .........341 Chapter 90. pam ..........427 Chapter 65. lsacctmrg........345 Chapter 91. patchinstall .......431 Chapter 66. lsadmin ........347 Chapter 92. pversions (UNIX) ....435 Chapter 67. lsclusters ........355 Chapter 93. pversions (Windows) . 439 Chapter 68. lseligible ........357 Chapter 94. ssacct .........441 Chapter 69. lsfinstall ........359 Chapter 95. ssched .........445 Chapter 70. lsfmon .........363 Chapter 96. taskman ........449 Chapter 71. lsfrestart ........365 Chapter 97. tspeek .........451 Chapter 72. lsfshutdown.......367 Chapter 98. tssub .........453 Chapter 73. lsfstartup ........369 Chapter 99. wgpasswd .......455 Chapter 74. lsgrun .........371 Chapter 100. wguser ........457 Chapter 75. lshosts .........375 Notices ..............459 Trademarks ..............461 Chapter 76. lsid ..........381 Privacy policy considerations ........461 iv Platform LSF Command Reference Chapter 1. bacct Displays accounting statistics about finished jobs. Synopsis bacct [-b | -l[-aff]] [-d][-e][-w][-x][-cname][-app application_profile_name][-C time0,time1][-D time0,time1][-f logfile_name][-Lp ls_project_name ...][-m host_name ...|-M host_list_file][-N host_name | -N host_model | -N cpu_factor][-P project_name ...][-q queue_name ...][-sla service_class_name ...][-S time0,time1][-u user_name ... | -u all][-f logfile_name][job_ID ...][-U resrvation_ID ... | -U all] bacct [-h | -V] Description Displays a summary of accounting statistics for all finished jobs (with a DONE or EXIT status) submitted by the user who invoked the command, on all hosts, projects, and queues in the LSF system. bacct displays statistics for all jobs logged in the current Platform LSF accounting log file: LSB_SHAREDIR/cluster_name/ logdir/lsb.acct. CPU time is not normalized. All times are in seconds. Statistics not reported by bacct but of interest to individual system administrators can be generated by directly using awk or perl to process the lsb.acct file. Throughput calculation The throughput (T) of the LSF system, certain hosts, or certain queues is calculated by the formula: T = N/(ET-BT) where: v N is the total number of jobs for which accounting statistics are reported v BT is the Start time:when the first job was logged v ET is the End time: when the last job was logged You can use the option -C time0,time1 to specify the Start time as time0 and the End time as time1. In this way, you can examine throughput during a specific time period. Jobs involved in the throughput calculation are only those being logged (that is, with a DONE or EXIT status). Jobs that are running, suspended, or that have never been dispatched after submission are not considered, because they are still in the LSF system and not logged in lsb.acct. The total throughput of the LSF system can be calculated by specifying -u all without any of the -m, -q, -S, -D or job_ID options. The throughput of certain hosts © Copyright IBM Corp. 1992, 2013 1 bacct can be calculated by specifying -u all without the -q, -S, -D or job_ID options. The throughput of certain queues can be calculated by specifying -u all without the -m, -S, -D or job_ID options. bacct does not show local pending batch jobs killed using bkill -b. bacct shows MultiCluster jobs and local running jobs even if they are killed using bkill -b. Options -aff Displays information about jobs with CPU and memory affinity resource requirement for each task in the job. A table headed AFFINITY shows detailed memory and CPU binding information for each task in the job, one line for each allocated processor unit. Use only with the -l option. -b Brief format. -d Displays accounting statistics for successfully completed jobs (with a DONE status). -e Displays accounting statistics for exited jobs (with an EXIT status). -l Long format. Displays detailed information for each job in a multiline format. If the job was submitted with bsub -K, the -l option displays Synchronous Execution. -w Wide field format. -x Displays jobs that have triggered a job exception (overrun, underrun, idle, runtime_est_exceeded). Use with the -l option to show the exception status for individual jobs. -cname In LSF Advanced Edition, includes the cluster name for execution cluster hosts and host groups in output. -app application_profile_name Displays accounting information about jobs submitted to the specified application profile. You must specify an existing application profile configured in lsb.applications. -C time0,time1 Displays accounting statistics for jobs that completed or exited during the specified time interval. Reads lsb.acct and all archived log files (lsb.acct.n) unless -f is also used. The time format is the same as in bhist. -D time0,time1 2 Platform LSF Command Reference bacct Displays accounting statistics for jobs dispatched during the specified time interval. Reads lsb.acct and all archived log files (lsb.acct.n) unless -f is also used. The time format is the same as in bhist. -f logfile_name Searches the specified job log file for accounting statistics. Specify either an absolute or relative path. Useful for offline analysis. The specified file path can contain up to 4094 characters for UNIX, or up to 512 characters for Windows. -Lp ls_project_name ... Displays accounting statistics for jobs belonging to the specified License Scheduler projects. If a list of projects is specified, project names must be separated by spaces and enclosed in quotation marks (") or ('). -M host_list_file Displays accounting statistics for jobs dispatched to the hosts listed in a file (host_list_file) containing a list of hosts. The host list file has the following format: v Multiple lines are supported v Each line includes a list of hosts separated by spaces v The length of each line must
Recommended publications
  • IBM Platform Symphony V5.2 Enables Scalable, High- Performance Grid Services for a Variety of Parallel Compute and Data Intensive Applications
    IBM United States Software Announcement 212-204, dated June 4, 2012 IBM Platform Symphony V5.2 enables scalable, high- performance grid services for a variety of parallel compute and data intensive applications Table of contents 1 Overview 7 Publications 2 Key prerequisites 8 Technical information 2 Planned availability date 13 Ordering information 2 Description 16 Terms and conditions 4 Product positioning 19 Prices 6 Program number 20 Order now At a glance IBM® Platform SymphonyTM V5.2 helps you exceed your performance goals with a fast, efficient grid computing environment. You can realize: • Faster throughput and performance • Higher levels of resource utilization • Reduced infrastructure and management costs • Reduced application development and maintenance costs • The agility to respond instantly to real-time demands For ordering, contact Your IBM representative or an IBM Business Partner. For more information contact the Americas Call Centers at 800-IBM-CALL (426-2255). Reference: YE001 Overview IBM Platform Symphony V5.2 is an enterprise-class grid manager for running distributed application services on a scalable, shared, heterogeneous grid. It accelerates a wide variety of compute and data-intensive applications, quickly computing results while making optimal use of available infrastructure. Platform Symphony's efficient low-latency middleware and scheduling architecture is designed to provide the performance and agility required to predictably meet and exceed throughput goals for the most demanding analytic workloads. Designed
    [Show full text]
  • EMS Web App Installation, Configuration, & User Guides May 2019
    EMS Web App Installation, Configuration, & User Guides May 2019 Accruent, LLC 11500 Alterra Parkway, Suite 110, Austin, TX 78758 www.accruent.com Accruent Confidential and Proprietary, copyright 2019. All rights reserved. This material contains confidential information that is proprietary to, and the property of, Accruent, LLC. Any unauthorized use, duplication, or disclosure of this material, in whole or in part, is prohibited. No part of this publication may be reproduced, recorded, or stored in a retrieval system or transmitted in any form or by any means—whether electronic, mechanical, photographic, or otherwise—without the written permission of Accruent, LLC. The information contained in this document is subject to change without notice. Accruent makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Accruent, or any of its subsidiaries, shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. Accruent Confidential and Proprietary © 2019 Page | i Table of Contents CHAPTER 1: EMS Web App Installation Guide 1 Contact Customer Support 2 CHAPTER 2: EMS Web App (V44.1) Introduction 3 Introduction to the EMS Web App 3 Installation Requirements 3 Upgrade Considerations 3 Contact Customer Support 4 CHAPTER 3: System Architecture 5 CHAPTER 4: Prerequisites and Requirements 7 Prerequisites 7 EMS Database Server Requirements
    [Show full text]
  • EGO Reference
    EGO Reference Platform EGO Version 1.2.3 January 2008 Copyright © 1994-2007 Platform Computing Corporation All rights reserved. Although the information in this document has been carefully reviewed, Platform Computing Corporation (“Platform”) does not warrant it to be free of errors or omissions. Platform reserves the right to make corrections, updates, revisions or changes to the information in this document. UNLESS OTHERWISE EXPRESSLY STATED BY PLATFORM, THE PROGRAM DESCRIBED IN THIS DOCUMENT IS PROVIDED “AS IS” AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL PLATFORM COMPUTING BE LIABLE TO ANYONE FOR SPECIAL, COLLATERAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION ANY LOST PROFITS, DATA, OR SAVINGS, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS PROGRAM. We'd like to hear You can help us make this document better by telling us what you think of the content, organization, and usefulness of the information. from you If you find an error, or just want to make a suggestion for improving this document, please address your comments to [email protected]. Your comments should pertain only to Platform documentation. For product support, contact [email protected]. Document This document is protected by copyright and you may not redistribute or translate it into another language, in part or in whole. redistribution and translation Internal You may only redistribute this document internally within your organization (for example, on an intranet) provided that you continue redistribution to check the Platform Web site for updates and update your version of the documentation.
    [Show full text]
  • Kali Linux Penetration Testing Bible
    Telegram Channel : @IRFaraExam Table of Contents Cover Title Page Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Telegram Channel : @IRFaraExam Summary CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary CHAPTER 10: Linux Privilege Escalation Telegram Channel : @IRFaraExam Introduction to Kernel Exploits and Missing Configurations
    [Show full text]
  • Platform LSF Foundations Chapter 1
    Platform LSF Version 9 Release 1.3 Foundations SC27-5304-03 Platform LSF Version 9 Release 1.3 Foundations SC27-5304-03 Note Before using this information and the product it supports, read the information in “Notices” on page 21. First edition This edition applies to version 9, release 1 of IBM Platform LSF (product number 5725G82) and to all subsequent releases and modifications until otherwise indicated in new editions. Significant changes or additions to the text and illustrations are indicated by a vertical line (|) to the left of the change. If you find an error in any Platform Computing documentation, or you have a suggestion for improving it, please let us know. In the IBM Knowledge Center, add your comments and feedback to any topic. You can also send your suggestions, comments and questions to the following email address: [email protected] Be sure include the publication title and order number, and, if applicable, the specific location of the information about which you have comments (for example, a page number or a browser URL). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1992, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. IBM Platform LSF: An Job submission .............12 Overview ..............1 Job scheduling and dispatch .........13 Introduction to IBM Platform LSF .......1 Host selection .............15 LSF cluster components...........2 Job execution environment .........15 Chapter 2.
    [Show full text]
  • Arxiv:1812.02759V2 [Astro-Ph.IM] 10 Dec 2018 Abstract Twenty Years Have Passed Since first Light for the Sloan Digital Sky Survey (SDSS)
    Draft version December 12, 2018 Preprint typeset using LATEX style emulateapj v. 12/16/11 THE FIFTEENTH DATA RELEASE OF THE SLOAN DIGITAL SKY SURVEYS: FIRST RELEASE OF MANGA DERIVED QUANTITIES, DATA VISUALIZATION TOOLS AND STELLAR LIBRARY D. S. Aguado1, Romina Ahumada2, Andres´ Almeida3, Scott F. Anderson4, Brett H. Andrews5, Borja Anguiano6, Erik Aquino Ort´ız7, Alfonso Aragon-Salamanca´ 8, Maria Argudo-Fernandez´ 9,10, Marie Aubert11, Vladimir Avila-Reese7, Carles Badenes5, Sandro Barboza Rembold12,13, Kat Barger14, Jorge Barrera-Ballesteros15, Dominic Bates16, Julian Bautista17, Rachael L. Beaton18, Timothy C. Beers19, Francesco Belfiore20, Mariangela Bernardi21, Matthew Bershady22, Florian Beutler17, Jonathan Bird23, Dmitry Bizyaev24,25, Guillermo A. Blanc18, Michael R. Blanton26, Michael Blomqvist27, Adam S. Bolton28, Med´ eric´ Boquien9, Jura Borissova29,30, Jo Bovy31,32, William Nielsen Brandt33,34,35, Jonathan Brinkmann24, Joel R. Brownstein36, Kevin Bundy20, Adam Burgasser37, Nell Byler4, Mariana Cano Diaz7, Michele Cappellari38, Ricardo Carrera39, Bernardo Cervantes Sodi40, Yanping Chen41, Brian Cherinka15, Peter Doohyun Choi42, Haeun Chung43, Damien Coffey44, Julia M. Comerford45, Johan Comparat44, Kevin Covey46, Gabriele da Silva Ilha12,13, Luiz da Costa13,47, Yu Sophia Dai48, Guillermo Damke3,50, Jeremy Darling45, Roger Davies38, Kyle Dawson36, Victoria de Sainte Agathe51, Alice Deconto Machado12,13, Agnese Del Moro44, Nathan De Lee23, Aleksandar M. Diamond-Stanic52, Helena Dom´ınguez Sanchez´ 21, John Donor14, Niv Drory53, Helion´ du Mas des Bourboux36, Chris Duckworth16, Tom Dwelly44, Garrett Ebelke6, Eric Emsellem54,55, Stephanie Escoffier11, Jose´ G. Fernandez-Trincado´ 56,2,57, Diane Feuillet58, Johanna-Laina Fischer21, Scott W. Fleming59, Amelia Fraser-McKelvie8, Gordon Freischlad24, Peter M. Frinchaboy14, Hai Fu60, Llu´ıs Galbany5, Rafael Garcia-Dias1,61, D.
    [Show full text]
  • SYMPHONY 5.3.4 User's Manual 1
    SYMPHONY 5.3.4 User’s Manual 1 T.K. Ralphs2 M. G¨uzelsoy3 A. Mahajan4 May 30, 2011 1This research was partially supported by NSF Grants DMS-9527124, DMI-0534862, and DMI-0522796, as well as Texas ATP Grant 97-3604-010. A revised version of Chapters 4 of this manual now appears in the Springer-Verlag book Computational Combinatorial Optimization edited by M. J¨ungerand D. Naddef, see http://link.springer.de/link/service/series/0558/tocs/t2241.htm 2Department of Industrial and Systems Engineering, Lehigh University, Bethlehem, PA 18017, [email protected], http://www.lehigh.edu/~tkr2 3Department of Industrial and Systems Engineering, Lehigh University, Bethlehem, PA 18017, [email protected], http://coral.ie.lehigh.edu/~menal 4Mathematics and Computer Science Division, Argonne National Lab, Argonne, IL 60439 [email protected], http://www.mcs.anl.gov/~mahajan/ °c 2000-2010 Ted Ralphs Acknowledgments First and foremost, many thanks are due to Laci Lad´anyi who worked with me on the development of a very early precursor of SYMPHONY called COMPSys many years ago now and who taught me much of what I then knew about programming. Thanks are due also to Marta Es¨o,who wrote an early draft of this manual for what was then COMPSys. This release would not have been possible without the help of both Menal G¨uzelsoy, who has been instrumental in the development of SYMPHONY since version 4.0, and Ashutosh Mahajan, who has worked on SYMPHONY since version 5.0. In particular, Ashutosh and Menal did all of the work that went into improving SYMPHONY for release 5.2.
    [Show full text]
  • IBM Platform Computing Cloud Service Ready to Use Platform LSF & Symphony Clusters in the Softlayer Cloud
    Platform Computing IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud February 25, 2014 1 © 2014 IBM Corporation Platform Computing Agenda v Mapping clients needs to cloud technologies v Addressing your pain points v Introducing IBM Platform Computing Cloud Service v Product features and benefits v Use cases v Performance benchmarks 2 © 2014 IBM Corporation Platform Computing HPC cloud characteristics and economics are different than general-purpose computing • High-end hardware and special purpose devices (e.g. GPUs) are typically used to supply the needed processing, memory, network, and storage capabilities • The performance requirements of technical computing and service-oriented workloads means that performance may be impacted in a virtualized cloud environment, especially when latency or I/O is a constraint • HPC cluster/grid utilization is usually in the 70-90% range, removing a major potential advantage of a public cloud service provider for stable workload volumes HPC Workloads Recommended for Private Cloud HPC Workloads with Best Potential for Virtualized Public & Hybrid Cloud Primary HPC Workloads 3 © 2014 IBM Corporation Platform Computing IBM’s HPC cloud strategy provides a flexible approach to address a variety of client needs Private Hybrid Public Clouds Clouds Clouds Evolve existing infrastructure to Enable integrated HPC Cloud to enhance approach to improve Access additional responsiveness, HPC cost and HPC capacity with flexibility, and capability variable cost model
    [Show full text]
  • Apache Ofbiz Advanced Framework Training Video Transcription
    Page 1 of 208 Apache OFBiz Advanced Framework Training Video Transcription Written and Recorded by David E. Jones Transcription and Editing by Nathan A. Jones Brought to you by Undersun Consulting Based on: The Apache Open For Business OFBiz.org Project Copyright 2006 Undersun Consulting LLC - All Rights Reserved Page 2 of 208 Copyright 2006 Undersun Consulting LLC Copyright 2006 David E. Jones Some content from The Apache Open For Business Project and is Copyright 2001-2006 Apache Software Foundation Copyright 2006 Undersun Consulting LLC - All Rights Reserved Page 3 of 208 Biz is running inside an application server, this infra- Advanced Framework structure still applies. The Containers and Compo- nents, they're just used in a slightly different way. The Overview easiest way to run OFBiz is out of the box, using the Introducing the Series OFBiz start executable jar file, which uses the con- tainer and component infrastructure to load everything Starting screen site/training/AdvancedFramework.html up, get all the tools started when the application server Hello my name is David Jones, and this is the Ad- shuts down, and to stop all of the tools and such as vanced Framework Training Video from Undersun Con- well. And also to configure each of the framework and sulting. I'll be recording and narrating this. I'm one of applications components that make up the open for the administrators of the Open for Business Project, business project. and offer various services including things like these So we'll talk about those, how they're configured, the training videos through a company that is run by myself different things to do plus some conventions for the and Andy Zeneski called Undersun Consulting.
    [Show full text]
  • Cracking the Lens: Targeting HTTP's Hidden Attack Surface
    Cracking the Lens: Targeting HTTP's Hidden Attack Surface James Kettle - [email protected] - @albinowax Modern websites are browsed through a lens of transparent systems built to enhance performance, extract analytics and supply numerous additional services. This almost invisible attack surface has been largely overlooked for years. In this paper, I'll show how to use malformed requests and esoteric headers to coax these systems into revealing themselves and opening gateways into our victim's networks. I'll share how by combining these techniques with a little Bash I was able to thoroughly perforate DoD networks, trivially earn over $30k in vulnerability bounties, and accidentally exploit my own ISP. While deconstructing the damage, I'll also showcase several hidden systems it unveiled, including not only covert request interception by the UK's largest ISP, but a substantially more suspicious Colombian ISP, a confused Tor backend, and a system that enabled reflected XSS to be escalated into SSRF. You'll also learn strategies to unblinker blind SSRF using exploit chains and caching mechanisms. Finally, to further drag these systems out into the light, I'll release Collaborator Everywhere - an open source Burp Suite extension which augments your web traffic with a selection of the best techniques to harvest leads from cooperative websites. Outline Introduction Methodology Listening Research Pipeline Scaling Up Misrouting Requests Invalid Host Investigating Intent - BT Investigating Intent - Metrotel Input Permutation Host Override Ambiguous Requests Breaking Expectations Tunnels Targeting Auxiliary Systems Gathering Information Remote Client Exploits Preemptive Caching Conclusion Introduction Whether it's ShellShock, StageFright or ImageTragick, the discovery of a serious vulnerability in an overlooked chunk of attack surface is often followed by numerous similar issues.
    [Show full text]
  • Oracle® Java Micro Edition Software Development Kit Developer's Guide Release 3.2 for Windows E24265-04
    Oracle® Java Micro Edition Software Development Kit Developer's Guide Release 3.2 for Windows E24265-04 September 2012 This document describes how to use the Java ME SDK plugin for NetBeans. Oracle Java Micro Edition Software Development Kit, Release 3.2 for Windows E24265-04 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Design and Analysis of Adaptive Caching Techniques for Internet Content Delivery
    Dissertation Design and Analysis of Adaptive Caching Techniques for Internet Content Delivery Thesis approved by the Department of Computer Science of the University of Kaiserslautern (TU Kaiserslautern) for the award of the Doctoral Degree Doctor of Engineering (Dr.-Ing.) to Daniel S. Berger Date of the viva : June 8, 2018 Dean : Prof. Dr. Stefan Deßloch PhD committee Chair : Prof. Dr. Pascal Schweitzer Reviewers : Prof. Dr. Jens B. Schmitt Prof. Dr. Florin Ciucu (University of Warwick) Prof. Dr. Mor Harchol-Balter (Carnegie Mellon University) D 386 Abstract Fast Internet content delivery relies on two layers of caches on the request path. Firstly, content delivery networks (CDNs) seek to answer user requests before they traverse slow Internet paths. Secondly, aggregation caches in data centers seek to answer user requests before they traverse slow backend systems. The key challenge in managing these caches is the high variability of object sizes, request patterns, and retrieval latencies. Unfortunately, most existing literature focuses on caching with low (or no) variability in object sizes and ignores the intricacies of data center subsystems. This thesis seeks to fill this gap with three contributions. First, we design a new caching system, called AdaptSize, that is robust under high object size variability. Sec- ond, we derive a method (called Flow-Offline Optimum or FOO) to predict the optimal cache hit ratio under variable object sizes. Third, we design a new caching system, called RobinHood, that exploits variances in retrieval latencies to deliver faster responses to user requests in data centers. The techniques proposed in this thesis significantly improve the performance of CDN and data center caches.
    [Show full text]