Imagine that you already have some valid SSL certificate (e.g. from Lets Encrypt with auto-renew, check and want to use it for your Pritun’s web panel.

Just open main file

mcedit /usr/lib/pritunl/lib/python2.7/site-packages/pritunl/

Find next strings (lines number 146-149)

        server_cert_path = os.path.join(settings.conf.temp_path,
        server_key_path = os.path.join(settings.conf.temp_path,

And replace them (or just comment with #) with

    server_cert_path = '/etc/letsencrypt/live/'
    server_key_path = '/etc/letsencrypt/live/'

And that is all.

March 19th, 2016

Posted In: tricks


Today I want to reborn my blog and share a little and very simple (and new?) trick – how to get RCE on the client side via jsonp in IE (any verison). This technique looks like on “reflected file download” from last BlackHat.

JSONP – a json data with «padding» – some callback function that allows to interact with received data on the client side. It usually needed in situation when we have 2 domains and due SOP we can’t read response from domain B while sending request from domain A.
 A typical example:
<!-- Request sent via a script tag -->
<script src=""></script>
<!-- Data received as an execution of the predefined function. -->
<script> function apiStatus(data) { console.log(data.status); } </script>
What we know about JSONP threats?
  1. JSONP leaks
  2. XSS via JSON / JSONP callbacks
  3. Advanced vector: “rosetta flash”
  4. ?


January 24th, 2015

Posted In: tricks