How to find hardware issues with SQL errors in an vmware environment. A read of the file at offset succeeded after failing 1 time(s) with error: incorrect pageid #vExpert @VMwarevSphere #esxi #database #sql #sqlserver #microsoft

I ran into som very strange problem on an SQL server this fall that I need to tell you about. The Error A read of the file 'D:\SQL PATH\Data.mdf' at offset 0x0000001ad60000 succeeded after failing 1 time(s) with error: incorrect pageid (expected 1:214336; actual 14854:3166640).¬† Even if we see these error SQL was able to... Continue Reading →

Review on Practical Web Application Security and Testing from @TCMSecurity and @mttaggart learn @owasp #hacking #education #almostfree

Hi! I do this one more time then I need to go back to the original schedule read here : https://blog.invid.eu/2022/01/06/my-ocsp-and-pnpt-journey-from-the-beginning-during-and-i-hope-the-end-tcmsecurity-thecybermentor-offsectraining-pnpt-oscp-joplinapp-reconmap-bhinfosecurity-strandjs-hacking-pentesting/ I did find this course very helpful so I need to say a few words. This course was amazing. One thing stands out from any other web course. After you finish the course you... Continue Reading →

Review on Practical Malware Analysis & Triage from @TCMSecurity and @HuskyHacksMK #malware #hacking #education #almostfree

Hi It is not often I do a post a review of¬† web courses except in my journey post https://blog.invid.eu/2022/01/06/my-ocsp-and-pnpt-journey-from-the-beginning-during-and-i-hope-the-end-tcmsecurity-thecybermentor-offsectraining-pnpt-oscp-joplinapp-reconmap-bhinfosecurity-strandjs-hacking-pentesting/ But I did find this course so dam good that I need to shout it out. This course was amazing. I learned alot, new stuff for me. Matt Kiely  @HuskyHacksMK who was the teacher is amazing,... Continue Reading →

How did I pass OSWP exam? Tips and Tricks. @offsectraining #PEN-210 #hacking¬†#pentesting #wireless #INVID #dyslexia

Hi! Today I received my first certification from Offensive-Security (not counting PEN-100). If someone else is in progress of taking this course or thinking about it here are my tips and tricks. Here are some links from offensive security that you shall read if you will attend an exam from Offensive-Security. Verification https://www.credential.net/bac14e8c-24e1-43c5-a2c7-8d0751543caa Links https://help.offensive-security.com/hc/en-us/articles/360046904731 https://proctoring.offensive-security.com/student/login https://help.offensive-security.com/hc/en-us/sections/360008126631 https://help.offensive-security.com/hc/en-us/articles/360050299352 https://www.offensive-security.com/legal-docs https://help.offensive-security.com/hc/en-us/articles/360046293832 ... Continue Reading →

Governance, Risk and Compliance (GRC) Analys Master Class with @Gerald_Auger #SimplyCyber @NIST #cybersecurity #education

I did take a small break today from Offensive Security today and found a realy nice course, not so practical but still very important. If some of below words is picking your brain this course is for youA Cybersecurity Primer, Compliance and Audit Work, Security Awareness Work, Cybersecurity Risk Work, Information Security Governance Work, Getting... Continue Reading →

Eat, Drink, Sleep and Shit security. How in a “easy” way keep you updated on what is happening out there. @BHinfoSecurity @ActiveCmeasures @WWHackinFest @intigriti #security #knowledge

How do you keep you updated on what is happening out there, I have some tools and workflow that will keep you busy. One thing you need to think about, not everything on the internet is the truth.The hard thing here is that there is endless information out there, but yo do not need to... Continue Reading →

How to document ActiveDirectory free and with #powerhsell export to excel and word #ActiveDirectory #documentation @evotecpl

Hi! As I am not writing alot of other stuff other than my goal to PNTP and OSCP right now ( https://blog.invid.eu/2022/01/06/my-ocsp-and-pnpt-journey-from-the-beginning-during-and-i-hope-the-end-tcmsecurity-thecybermentor-offsectraining-pnpt-oscp-joplinapp-reconmap-bhinfosecurity-strandjs-hacking-pentesting/ ). But in this case I have to. I was looking for a simple way to document a new customers Active Directory. How shall I do that in a easy way? I had... Continue Reading →

My OCSP and PNPT journey from the beginning, during and I hope “the end”. @TCMSecurity @thecybermentor @offsectraining #PEN-100 #PEN-103 #PEN-200 #PEN-203 #WEB-100 #SOC-100 #PNPT #OSCP @joplinapp @reconmap @BHinfoSecurity @ActiveCmeasures @WWHackinFest @strandjs #hacking #pentesting

Intro Hi all! My plan is that under 2022 to take OSCP and PNPT exam. To get the full picture we start from the beginning. Why do I post this? Share knowledge is the simple answer, and I am getting old so I need to document everything I do. I think this is a good... Continue Reading →

Podcasts you need to take a look at. @DarknetDiaries @DanielMiessler @IntelTechniques @InfosecEdu @7MinSec @coalfirelabs @NetSPI @breachsense @TrustedSec @riskybusiness @thehackscastÔŅľ@NakedSecurity @thehackerish @CyberSpeaksLIVE @BHinfoSecurity @PentesterLand @itsakerhetspodd @geoffwhite247 @CSI_Podcast

Here are podcasts that I like to listen to when I can. It is not best to worst list it is only a list!Some of them has not been updated for some time, but still check them out. https://darknetdiaries.com/https://twitter.com/DarknetDiaries https://danielmiessler.com/podcast/https://twitter.com/DanielMiessler https://inteltechniques.com/podcast.htmlhttps://twitter.com/IntelTechniques https://breachsense.io/https://twitter.com/breachsense https://thehacks.libsyn.com/websitehttps://twitter.com/thehackscast https://nakedsecurity.sophos.com/https://twitter.com/NakedSecurity https://thehackerish.com/https://twitter.com/thehackerish https://7ms.us/https://twitter.com/7MinSec https://www.netspi.com/agentofinfluence/https://twitter.com/NetSPI https://www.blackhillsinfosec.com/https://twitter.com/BHinfoSecurity https://risky.biz/https://twitter.com/riskybusiness https://www.trustedsec.com/podcasts/https://twitter.com/TrustedSec https://www.infosecinstitute.com/podcast/https://twitter.com/infosecedu https://coalcast.libsyn.com/website/category/Coalfirehttps://twitter.com/coalfirelabs https://pentester.land/https://twitter.com/pentesterland https://www.mcafee.com/en-us/consumer-support/podcast.htmlhttps://twitter.com/McAfee https://coinsecpodcast.com/https://twitter.com/CoinSecPodcast... Continue Reading →

Courses and Certifications that I have taking over the years. Knowledge is the key.

If you are interested in any just send me an email if you want information about them. This is mostly a reference page to other bloggposts. Linux Privilege Escalation for Beginners 2021-01-06Windows Privilege Escalation for Beginners 2021-01-05Practical Ethical Hacking - The Complete Course 2021-01-04Modern C2 and Data Exfiltration 2021-12-16Post Breach FSOS-False Sense of Survival 2021-12-15Intro... Continue Reading →

Open-Source Vulnerability Assessment and Pentesting Management¬†Platform @reconmap #pentesting #opensource #hacking #opensource #cybersecurity

Hi again! Time to look at reconmap. We in this line of work love abbreviation, so I call this OVAPMP (Vulnerability Assessment and Pentesting Management Platform). I was looking for a tool/system documenting my work regarding vulnerability scans, pentest and bug bounty work. I have tried different kind of solutions, I think I have found the... Continue Reading →

Install, build and run Sn1per. Testing the free version. @Sn1perSecurity #attacksurface #infosec #assetmanagement #attacksurfacediscovery #bugbounty #platform #netsec #offsec #redteam #pentest #attacksurfacemanagement

Hi all out there. It is time to take a look at sn1per. A tool that automate opensource stuff for us. As always we start with the steps Install some os in my kase running kaliGet the docker fileBuildRun sn1per installation wget https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile docker build -t sn1per . Below is gonna take some time to... Continue Reading →

How to approach security by learning or really any learning (my way) @albinowax @jaybeale @ralphte1 @goteleport @CyberDefenders @BanjoCrashland @BHinfoSecurity @dayzerosec @NakedSecurity @cert_se #pentest #PENTESTING #redteam #infosec

First thanx to all mention in this post! The hard thing about security is the wide range of stuff you have to learn if you wanna be the best. That is the goal you should have, I want to be the best. But the downside of this is that how do I learn everything, I... Continue Reading →

Fith step in setting up C2 environment. Using socat as front to SILENTTRINITY. Command and Control my way. @c2_matrix @byt3bl33d3r @porchetta_ind #pentest #pentesting #redteam #infosec

Now we are gonna look at SILENTTRINITY from @byt3bl33d3r I think this will be the last test of Command and Controll application. I have other stuff to do. But I hope you all had a good read and set some things in motions for you. Here is the link that you can read and download... Continue Reading →

Fourth step in setting up C2 environment. Using socat as front to Covenant. Command and Control my way. @c2_matrix #Covenant #pentest #pentesting #redteam #infosec

It is time for part 4 in this series to set up a Command and Control, and this time I am trying out C2 server Covenant. You can go and read about Covenant here https://github.com/cobbr/Covenant. A picture says more than 1000 words so lets start with that! Covenant Short list install kaliapt-get updateapt full-upgradesystemctl enable... Continue Reading →

Third step in setting up C2 environment. Using socat as front to merlin. Command and Control my way. @c2_matrix @merlin_c2 #pentest #pentesting #redteam #infosec

It is time for part 3 in this series to set up a Command and Control, and this time I am trying out C2 server Merlin. You can go and read about Merlin here https://github.com/Ne0nd0g/merlin. A picture says more than 1000 words so lets start with that! Merlin The short step by step list install... Continue Reading →

First steps in setting up C2 environment. Using socat as front to metsaploit. Command and Control my way. @c2_matrix @metasploit #pentest #pentesting #redteam #infosec

Hi, I know that is been a while since the last post, but life got in the way. But it is time now. My goal in these coming post is to setup different Command and Control systems and try them out. Information about different C2 can be found on this fantastic site https://www.thec2matrix.com/ So as... Continue Reading →

How to revert from NVMe controller to paravirtulized scsi controller. Blue screen inaccessible boot device when I do that. How to fix it with 2 commands #windows10 @PURESTORAGE @VMWARE #VEXPERT #ESXI #PERFORMANCE

Hi all! The latest posts has been about how to get the most of our hardware in a virtual machines. But sometimes you need to revert stuff you do. Or as me, try everything that can go wrong. When I revert from paravirtulized driver on my Windows 10 vm to NVMe controller everything went fine.... Continue Reading →

New version of hashcat is out. Time to test version 6.2.0 @HASHCAT #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #BRUTEFORCE #NVIDA #TESLAM60

Hi all! There is a new version of Hashcat out for you to try! Here you can download it https://hashcat.net/hashcat/ 312 different algorithms to use. The different attack modes are: Straight, Combination, Brute-force, Hybrid dict + mask, Hybrid mask + dict and Association Fixes There is 26 bugfixes in this release. New attack mode: Association... Continue Reading →

Choose SCSI Controller to get the best performance on a VM. What SCSI controller on VM shall I use. Queue Depth settings on ESXi. Queue Depth in Windows VM. Pure Storage performance. @PureStorage @VMware #vExpert #esxi #performance

Last post I was looking at vCPU configuration on a vm to get best performance on a vm. Now it is time to take a look at performance on the disk side. To test performance I used CrystalDiskMark. Finally I was able to add a file in WordPress, the link to the file is at... Continue Reading →

In place upgrade to Windows 2019 from Windows 2016. Error 0xC1900101 – 0x30018 The installation failed in FIRST_BOOT phase with an error during SYSPREP operation. #windows2019 @MicrosoftHelps @Microsoft

Hi all! This must be one of the first time that this happens, something about Windows in this blogg. But i felt like this must be shared. I was doing in place upgrade from Windows 2016 to 2019. And some some servers went well and some got this message. The upgrade went to about 52%... Continue Reading →

Attending Active Defense & Cyber Deception with @strandjs and want to run the WINADHD vm in ESXi, please read this. @WWHackinFest @BHinfoSecurity @ACTIVECMEASURES #ACTIVECOUNTERMEASURES #THREATHUNTING #BEACONS #WINADHD

If you attending John strand in this epic course and want to run the lab vm in Vmware ESXi please read this. If not, go and do something with your girlfriend,boyfriend or children or take a beer and relax! Hi, I am looking at a new way to work so I was not able to... Continue Reading →

Attending Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-hours and want to run the VM in QEMU/KVM this is how I got it to work. @ActiveCmeasures #activecountermeasures #AIHunter #ThreatHunting #Beacons #Activecountermeasures @Zeekurity

Hi all! If you are like me attending the Threat Hunting Training Course named Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-Hours on Thursday and want to run the virtual machine in qemu/kvm native do it like this. Download and read the below link! https://www.activecountermeasures.com/cyber-threat-hunting-training-course/ As always start with the short version! Convert... Continue Reading →

How to do remote work smooth with any device and still use camera, microphone in any application. Using my work PC as remote nod and Ubuntu as a client home. @vmware @vmwarehorizon @vExpert @ubuntu @vExpert #remote #WorkFromHome #linux

Goal for today is to connect to work machine, in this case a Windows 10 and have all the functions that I have when I am physical at work. So I had some requirements on my list. Client at home can be anything (Linux in my case)Must support camera and microphoneFastNo lagSimple to useSecure First... Continue Reading →

CEH Master, LPT, eJPT and eCPPTv2. My thoughts about the exams ,courses and how I got there. @ECCOUNCIL @eLearnSecurity @ReadynezSocial @hackthebox_eu @RealTryHackMe @BHinfoSecurity @RedSiege @WWHackinFest @ActiveCmeasures

I am gonna try to explain how my dedicated my life to work and what it takes for me to get this far. This is gonna be about the penetrations exams that I took, but I would not have passed these if I did not took the Novell Netware Networking course back in the days.... Continue Reading →

Passing the eCPPTv2 certification from eLearnSecurity. 10 answers for you to pass the exam. Thanx to @eLearnSecurity @RealTryHackMe #eCPPTv2 @thecybermentor #infosec #hacking #pentest #pentesting #redteam #hackthebox #linux4hackers #blackbox

Got the eCPPTv2 Certification today. Nice way to start the year with. 7 days of penetration testing and 7 days of report writing. Total of 14 days. This is the schedule that you get. The penetration test is in form of black box. You can use what tool you want. Why invent the wheel again?... Continue Reading →

Adding automating pentest tools for WebApi to my hacking rig. Astra and Fuzzapi. @bsdbandit @RedSiege @TimMedin @Fuzzapi0x00 #OpenSource #Security #WebServices #API #webapi

This blog will be relatively short, but I thought the webinar I listened to was so interesting that I have to write about it. Webinar from Red Siege yesterday evening (21.00 Swedish time) regarding hacking webapi. Link: https://www.redsiege.com/api/. This was presented by @bsdbandit. I was blown away, this is really cool stuff. I was the... Continue Reading →

Explain in my own way how to do basic Buffer Overflow. With help from @RealTryHackMe #BufferOverlow #Hacking #INFOSEC #LINUX4HACKERS #pentest #pentesting #redteam

First this is not advanced BufferOverflow, more for me to write down and document what I did at tryhackme to get BufferOverflow Prep working. We start of what you need. Windows 7 box with ImmunityDebugger and mona installed. Access to the application ocsp.exe. You can do this online with tryhackme or download the application your... Continue Reading →

Why would you use masks with hashcat when you crack hashes in brute force mode. @hashcat #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #TESLAM60 #NTLM #BRUTEFORCE

In this post I will try to explain why it is important to use masks when you crack password from hashes with hashcat. The machine that I run hashcat on has 2 Tesla M60 card and running Linux. Why do I not use longer password in this test, I do not want to wait 7... Continue Reading →

How to export/crack SAM database with internal Windows tools if you do not have access to mimikatz / hashdump / metasploit. As a bonus we also look at cached domain hashes. #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #TESLAM60

Hi! I wanted to dump hashes on a Windows 10 box without any external tools. This is how I did it. We start at first with the short version Export SAM with reg.exeConvert SAM with impacket-secretsdump to get to the hashesUse hashcat to crack the hashes We start first with exporting the sam database with... Continue Reading →

Using MindMap application when doing pentest or ctf! Up for you to decide. #MindMaps #freesoftware #kali #linux4hackers #linux #infosec #hacking #pentest #pentesting #redteam @kalilinux #ctf #bugbountytips @insilmaril

I was thinking about a nice and easy way to save a penetration test and come up with this.Use a MindMap application.There is a alot of MindMap application out there. I am running Linux on my machine so I ended up with VYM. (http://www.insilmaril.de/vym/)The nice thing about VYM is that it is free and comes... Continue Reading →

How to get autocompletion working great instead of good in powershell for linux. #powershell #pwsh #pwsh-preview #linux @ubuntu @powershell #autocompletion

My colleague @Schillman told me that you can get better autocompletion in powershell for linux. I thought that was interesting thing to try. Soon Sebastian will see the light in the tunnel and convert to a real operating system like linux and we will get more interesting things from him. This is what you can... Continue Reading →

Configure Office365 as a Service Provider in a federation and use Fortinet as Identity Provider. @Fortinet #fortinet #SAML @Office365 #federation @AzureSupport #cloud #cloudsecurity # #fortinet

Hi, a hole different topic today. On the table is federation. In this case we want a third party solution to handle authenticate to Office365. Then we can control all the login function in our own product. Federation talks a specific language that is called SAML ( Security Assertion Markup Language ).More information regarding SAML... Continue Reading →

Install PowerShell on Ubuntu 20.04 and add support for AzureAD. #powershell @ubuntu #linux @Microsoft @Azure #linux-guy-try-windows

Hi I want t run PowerShell on my Ubuntu machine and also add support for Azure. Because soon I will try to set up some federation in Azure. Below is from Microsofthttps://docs.microsoft.com/en-us/microsoft-365/enterprise/connect-to-microsoft-365-powershell?view=o365-worldwideIt is in Swedish but It says that Ubuntu 20.04 is not supported. I will be supported in the 7.1 release. The screenshot is... Continue Reading →

Installing Crowdsec on my hacking rig. How to block unwanted connections. Like bruteforce attacks on ssh. @Crowd_Security @DanielMiessler #hacker #bruteforce #ssh #cybersecurity #Security

I was reading on Daniel Miessler website and got really excited about his article about replacement to fail2ban. https://danielmiessler.com/study/crowdsec/?mc_cid=970356fcef&mc_eid=fa6207cba8 ). Please subscribe to his newsletter, really nice reading. Daniel explains this application in detail and I want to show how I did the installation on my machines. Some difference are there. I wont say it... Continue Reading →

Installing Microsoft Edge dev version on ubuntu 20.04. @MicrosoftEdge @EdgeDevTools @ubuntu #linux #ubuntu

Finally (can I say that?) it is edge time on Linux. Really straight forward to get Edge on you Ubuntu 20.04. But I will put this out anyway! This is a dev version so there will be functions that will not work yet. Download package from Microsoft: https://packages.microsoft.com/repos/edge/pool/main/m/microsoft-edge-dev/ Install from cli sudo apt-get install ./microsoft-edge-dev_88.0.673.0-1_amd64.deb... Continue Reading →

Install LogonTracer in my hacking rig. #blueteam @jpcert_en #LogonTracer #ubuntu #linux #infosec #logging #hacking @Docker #logontracer @neo4j

It is time to test LogonTracer from @jpcert_en you can get your copy from https://github.com/JPCERTCC/LogonTracer From the website:LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows active directory event logs. We start with a new installation of ubuntu. The servername for this is Logon. The installation is not in this post.... Continue Reading →

Installing Security Onion 2.3 in my hacking rig. @securityonion #opensource @Elasticsearch #zeek #grafana #qsquery #wazuh #thehive #playbook #kibana #squert #snort #cortex #fleet #suricata #logstash @BHinfoSecurity @elastic @TheHive_Project @grafana

I must thank @BHinfoSecurity to get my interest in this. There webinars is great, especially 30 minutes before the real webinar begins.Now lets get started. As you have seen I did installation of 16.04 version before. My mistake, to tired! No I have to do this again with the new version. Like 16.04 version this... Continue Reading →

How to access internal machines with ssh tunneling. Tunnel rdp thru a jumpstation with ssh. #infosec #hacking #pentest #pentesting #redteam #linux4hackers #kali #parrotos #linux #linux4hackers #ssh

This is follow up of the previous post regarding my rig. How do I access this where ever I am? I use SSH tunneling for that. If I loose connection for some reason I always use tmux on the target so I can reconnect to the same session as before. We start with a picture,... Continue Reading →

How did I create hacking rig for ethical hacking. Based on VMware with Tesla M60. #infosec #hacking #pentest #pentesting #redteam #hackthebox #tryhackme #linux4hackers #ctf #kali #parrotos #linux #godaddy #linux4hackers

My goal with this project was to create a hacking rig that I can use when doing hackthebox, tryhackme and other ctf:s. I was lucky to get my hands on a server with Tesla M60 card. My other goal was also to have a server that I can use in phishing tests, and show others... Continue Reading →

Knowledge Update 2020-08-20

Hi!Welcome to the first of many (I hope) knowledge updates from me. My goal is so gather information in one post instead of many posts.Most of this information are from third party and I do not have the time to source review everything. But still I like of sharing my thoughts to you.This first knowledge... Continue Reading →

How to get IPv6 and IPv4 support with proxychain4 running kali. #hack #kali #linux #infosec #hacking #pentest #pentesting #redteam #proxychain4

I wanted to use proxychain with IPv6, ended up with this configuration. If you have not install proxychain4 do that now! Tor configuration file add below /etc/tor/torrc SocksPort [::1]:9050 SocksPort 127.0.0.1:9050 ClientUseIPv6 1 ClientPreferIPv6ORPort 1 ClientPreferIPv6DirPort 1 Proxychain4 configuration file. Add the information below in the file under [ProxyList] /etc/proxychain.conf socks5 :: 9050 socks4 127.0.0.1... Continue Reading →

If you are attending “Getting Started in Security with BHIS and MITRE ATT&CK with @strandjs” next week and running Linux and VirtualBox. How to import the machine? @BHinfoSecurity @WWHackinFest @debthedeb #cybertraining #hackers #CyberSecurity #infosec

I am running Kali and VirtualBox. When running Virtualbox there are some issues. If the machine that you are running AMD this perhaps works. I am running INTEL so that sucks. INTEL + VirtualBox + Wsl v2 = Do Not Work For Me. There is a problem running wsl v2 in VirtualBox with Windows 10.Not... Continue Reading →

How to disable systemd-resolved. Problem to get resolve.conf updated with NetworkManger #ubuntu #networkmanager #linux #INVIDGruppen

When you running systemd-resolved you have entry in /etc/resolv.conf that points to nameserver 127.0.0.53. When you troubleshoot sometimes you do not want this. This is how I did it: Disable systemd-resolved sudo systemctl disable systemd-resolved.service sudo systemctl stop systemd-resolved 2. Edit network-manager settings files /etc/NetworkManager/NetworkManager.conf and dns=default roger@xps13:~$ cat /etc/NetworkManager/NetworkManager.conf [main] plugins=ifupdown,keyfile dns=default [ifupdown] managed=false... Continue Reading →

Powershell and Vmware PowerCLI, get-vm exception has been thrown by the target of an invocation. How to fix and add proxy in powershell. Add PSGallery as a repo.#vExpert #VMware #powershell #vmwarepowercli

Uninstall PowerCLI from VMware (we add it later from PSGallery) Start Powershell Set tls security to 1.2 [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 Set http proxy [Environment]::SetEnvironmentVariable("HTTP_PROXY", "proxy.invid.se:3128", [EnvironmentVariableTarget]::Machine) Set https proxy [Environment]::SetEnvironmentVariable("HTTPS_PROXY", "proxy.invid.se:3128", [EnvironmentVariableTarget]::Machine) Now that we have internet connection you can try in powershell, just for confirmation. wget https://invid.se Now it is time to register PSgallery... Continue Reading →

Spam-test. Test if your email adress / domain are on any blacklist or if anything is wrongly configured. Check for spf,dkim and other stuff. #pentesting #blueteam #cybersecurity #spam #tester

This is a simple way to test if your email security is ok. Open a web browser and access https://mail-tester.com and copy the destination email on the page. Then send a email to that address that you got from the page Then go back to the web page and press Then check your score. (wait... Continue Reading →

Buffer Overflow, how do I prepare for Penetration Testing Professional V5 buffer overflow part. @eLearnSecurity #bufferoverflow #infosec #hacking #pentest #pentesting #redteam #hackthebox #INVIDGruppen #INVID

I am¬† not a programmer from the beginning so I struggle a lot with buffer overflow part of the PTP course. I can not turn back¬† time 25 years and start study programming so how do a old dog learn buffer overflow? This is what I do. Watch Videos, I learn faster if someone tells... Continue Reading →

How to set up juice-shop @ heroku for free. Then begin hacking your own web application. @heroku @owasp #infosec #hacking #pentest #cybersecurity #webhacking

Update 2022-08-25 Seems that this is not gonna be free anymore ūüôā https://blog.heroku.com/next-chapter I was watching a YouTube video from https://twitter.com/thecybermentor  and wanted to spread the word to my 2 followers. This is a great way to get started with web application hacking. You will set up your own environment in seconds. After the deployment... Continue Reading →

Create file with hostnames from website with cewl, then scan the webserver for vhosts with Metasploit vhost_scanner to find hidden virtual hosts on webserver. #infosec #hacking #pentest #pentesting #redteam #hackthebox #ctf #linux4hackers

We start to collect possible hostnames from websites with Cewl cewl http://10.10.10.1 -w cewl.txt You can also use some other switches like -d = deph to look on the website for words -m = minimum wordlengh -w = outputfiel So that the final command can look like this: cewl http://10.10.10.1 -d 5 -w cewl.txt When... Continue Reading →

Copy vswitch vlan from one host to another with powershell. @VMware #vExpert #esxi #VMware

This simple powershell scripts copy vlans from one server to another. With this script I needed to manually create the vmotion network after. But all other vlans was ccreated. Start Powershell In this case I was running linux. pwsh Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -Confirm:$false Connect-VIServer cmdlet Connect-VIServer at command pipeline position 1 Supply values for the... Continue Reading →

Terminator + tmux = perfect match? Starting and attaching tmux sessions from terminator automatic with bash. @kalilinux #kali #kalilinux #linux#linux4hackers #linux #tmux #terminator #infosec #hacking #pentest #pentesting #redteam

My goal was to start Terminator, that's the terminal program I use and the reattach to tmux sessions in the three windows that I have. If I close terminator and started it again I wanted the tmux sessions to reattach to the old ones. And I i close tmux I wanted the same tmux windows... Continue Reading →

How to import missing key from all the repository in a one liner. @kalilinux #kali #kalilinux #linux #gpgkey #NO_PUBKEY

You get this error when you apt-get update The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 1A1C1C101311121 How to import missing gpg key from all the repository in a oneliner. Thanx to https://www.linuxuprising.com/2019/06/fix-missing-gpg-key-apt-repository.html sudo apt update 2>&1 1>/dev/null | sed -ne 's/.*NO_PUBKEY //p' | while read key; do if... Continue Reading →

CORE-IT is a FREE virtual conference hosted by Chappell University. The online event begins March 24th at 9 am Pacific Time. #wireshark #nmap #darknet @torproject #kismet #tcp #dns @LauraChappell https://www.engagez.net/coreit1#lct=entrance

I got an email regarding a  free Virtual Conference 2020! Could be something real nice! https://www.engagez.net/coreit1#lct=entrance Agenda here: https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf

Fishing with Raspberry Pi, Kali, Auto connect to VPN, Auto register domain with GoDaddy, Automatic SSL cert with Letsencrypt, Run Golang, Run Gophish @letsencrypt @golang @kalilinux @GoDaddy #kali #raspberrypie #linux #infosec #hacking #pentest #pentesting #redteam #gophish

This is just for demo, I used root as user, you should perhaps consider other user to do this. Installation of Kali Download Kali Image https://www.offensive-security.com/kali-linux-arm-images/ Flash the SDCARD with etcher on you Kali box or any other burning program. Put the sdcard in the PI and boot OpenVPN Autostart Download opvpn conf file from... Continue Reading →

How to exploit Active Directory ACL based privilege escalation path with Bloodhound and aclpwn.py. Then collect the hashes, if you are lucky to get that level of access with secretdump.py #kali #kalilinux #hacking #pentest #pentesting #redteam

This was done from Kali box. Of course the Sharphound was ran on a compromised computer. Used application Bloodhound and Sharphound ( https://github.com/BloodHoundAD/SharpHound ) aclpwn ( https://github.com/fox-it/aclpwn.py ) Steps to do it Get output with sharphound and put that on our kali box use -all when run the Sharphound. Start neo4j and bloodhound import the... Continue Reading →

Microsoft change from ldap to ldaps. What will happen to my Vcenter with Integrated Windows Authentication (IWA) customers. #vcenter #vmware #ldap #ActiveDirectory

Integrated Windows Authentication (IWA) has also been tested by VMware Engineering and verified to be compatible with these changes. IWA uses different protocols and mechanisms to interact with Active Directory and is not affected by changes to the Active Directory LDAP servers. Where did I find this information: Microsoft https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190023 Vmware https://blogs.vmware.com/vsphere/2020/01/microsoft-ldap-vsphere-channel-binding-signing-adv190023.html https://kb.vmware.com/s/article/2149697

How to turn of power management on the wifi in kali 2010.1 (or any other distro using NetworkManager). @kalilinux #kali #kalilinux #linux #NetworkManager

Sometimes there are issues with speed, performance, lost of connection to access points. This can be helpful in some configurations. Before: iwconfig wlan0 wlan0 IEEE 802.11 ESSID: Mode:Managed Frequency:5.26 GHz Bit Rate=6 Mb/s Tx-Power=20 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on Link Quality=56/70 Signal level=-54 dBm Rx invalid nwid:0 Rx invalid crypt:0... Continue Reading →

Kali 2020.1 XFCE. Unable to start any program from gui that requires root privilege. Synaptic just do not start. Firewall-applet just say unable to communicate. It starts fine from cli. @kalilinux #kali #kalilinux #linux

I just installed Kali weekly release (2020.1) with KDE and XFCE and all things seems to work very fine. But one thing with XFCE is that when I try to start things fron XFCE that use root permission it wont work. Strange errors or the applications just do nothing. gksu is no longer availble pkexec... Continue Reading →

Problem with Nimble plugin in VirtualCenter 6.7U3 or any other plugin. #VMWare #VirtualCenter #nimble #storage

How to completely remove and start from scratch regardning Nimble Plugin in Vcenter. W had the plugin that was in running mode 1 - Unregister the array from VC in Nimble 2- Clean the VC cache SSH to vcenter server shell service-control --stop vsphere-client service-control --stop vsphere-ui cd /etc/vmware/vsphere-client/vc-packages/vsphere-client-serenity rm -rf com.nimblestorage.* cd /etc/vmware/vsphere-ui/vc-packages/vsphere-client-serenity rm... Continue Reading →

How did my journey to Licensed Penetration Tester (Master) Certification begins and ends. My own thoughts. #LPTMaster #penetrationtesting #infosec #eccouncil @ReadynezSocial @ECCOUNCIL

My journey began 2018-07-09 at Readynez ( √Ėren√§s Slott) a rely warm summer week for Sweden anyway, almost 30 degrees Celsius. Here is what I think about about the journey that I choose to take. CEH Course There is a lot talk about this course on social media. But for a beginner like me this... Continue Reading →

How to get VMware Remote Console on Kali 2019.4

Thanx to Dave Parker http://computersalad.blogspot.com/2018/09/using-vmware-remote-console-on-debian.html sudo su cd /usr/lib/vmware/bin mv vmrc vmrc.old Create a new vmrc file in /usr/lib/vmware/bin with this content #!/bin/bash LIBDIR="/usr/lib/vmware/lib" BINDIR="/usr/lib/vmware/bin" LD_LIBRARY_PATH="" for dir in $(find ${LIBDIR} -type d) ; do LD_LIBRARY_PATH="${dir}:${LD_LIBRARY_PATH}" done export LD_LIBRARY_PATH ln -s ${BINDIR}/appLoader /tmp/vmrc /tmp/vmrc $* rm -f /tmp/vmrc exit 0

Autostart links with OneGate, Tunnel, HTML5 and Web resources.

This is how you create autostart links with OneGate. If you are runing the lates version and https only, change http to https. Tunnel http://onegate.invid.se.se/mg-local/autostart?resource=mg-local&uri=/mg-local/jretestifneeded?path=https:/rdp-server01.onegate.invid.se/parameters?resource=rdp-server&port=33891&cpopup=no&client=/mg-local/terminalserver/terminalserver-wrapper.html&p1=TRUE&p2=TRUE&p3=TRUE&p4=FALSE&p5=TRUE&p6=1280&p7=1024&p8=TRUE&p9=TRUE&p10=&description=asdfvbm9taXNlcasdfasdfasdfw=&logintype=webtoken   HTML  http://onegate.invid.se/mg-local/autostart?resource=rdp-server&uri=/mgdev-gw&logintype=webtoken   Webresurs http://onegate.invid.se/mg-local/autostart?resource=www-server&uri=/page&formfill=false&logintype=webtoken

Get VM on what Datastore and what DRS group the VM is member of, export the result and email to you in a oneliner.

Special thanks to my better looking colleague @ http://blogg.schillman.se/ He is a powershell guru! I did this on Linux so I do not have the power to store username and password. But I know that you can do this if you are running Windows! If the vmware modules are not installed: Start powershell Set-PowerCLIConfiguration -InvalidCertificateAction:Ignore... Continue Reading →

Add & Remove VM from DRS Groups based on datastore. Using PowerShell Ubuntu 19.10 Budgie. Add-DrsVMtoDrsVMGroup and Remove-DrsVMFromDrsVMGroup

Thanks to Author: Tim Carman Twitter: @tpcarman Github: tpcarman https://www.timcarman.net/2017/10/27/add-remove-virtual-machines-based-datastore-location-powercli/ Functions: Add-DrsVMtoDrsVMGroup Remove-DrsVMFromDrsVMGroup ¬†install Powershell Get PowerShell to work with ubuntu 19.10 Budgie Create Powershell Profile Run it! sudo snap install powershell --classic export DOTNET_SYSTEM_GLOBALIZATION_INVARIANT=1 vi /home/USERNAME/config/powershell/Microsoft.PowerShell_profile.ps1 Paste the following in the file: $Hour = (Get-Date).Hour If ($Hour -lt 12) {"Morning Master"} ElseIf ($Hour -gt... Continue Reading →

How to get vDocumentation to work in PowerShell

Start PowerShell as Administrator Install-Module -Name VMware.PowerCLI -Scope CurrentUser Install-Module ImportExcel -scope CurrentUser Install-Module vDocumentation -Scope CurrentUser Set-ExecutionPolicy Unrestricted Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -Confirm:$false Connect-VIServer Then you are up and runnig Great work from Ariel Sanchez Mora¬† https://github.com/arielsanchezmora/vDocumentation Get-Module vDocumentation -ListAvailable | Format-List Get-ESXInventory Document host hardware inventory and host configuration Get-ESXIODevice Document information from HBAs,... Continue Reading →

VMware Converter 6.2 failed after 3% with error FAILED: An error occurred during the conversion: ‘BlockLevelVolumeCloneMgr::CloneVolume: Detected a write error during the cloning of volume \WindowsBitmapDriverVolumeId=[60-2A-FF-68-00-00-10-00-00-00-00-00]. Error: 37409 (type: 1, code: 2338)’

1 physical server to virtual with VMware Converter 6.2 failed after 3% with error. FAILED: An error occurred during the conversion: 'BlockLevelVolumeCloneMgr::CloneVolume: Detected a write error during the cloning of volume \WindowsBitmapDriverVolumeId=[60-2A-FF-68-00-00-10-00-00-00-00-00]. Error: 37409 (type: 1, code: 2338)' Source machine had Teaming configured and I just pulled out the cabels and put new one in... Continue Reading →

Migrate to Virtual Center 6.7 when the Virtual Center is Virtulized on providers Virtual Center. Migrated Virtual Center has no ip connectivity to local ESXi host. Add extra nic to VirtualCenter is the soloution!

You need ip connectivity from the temp VC to the ESXi host that the upgraded VC is hosted. We want to upgrade VC-CUST (192.168.1.1), in this case migrate to 6.7 from 6.5. This CirtualCenter resides in hosted VirtualCenter VC-Provider. VC-Provider has NO ip connectivity to customer. VC-CUST has no IP connectivity to ESXI host (172.16.1.2)... Continue Reading →

CONFIGURING PURE1 VM ANALYTICS With Proxy settings

Please follow this great guide from Cody! https://www.codyhosterman.com/2018/10/configuring-pure1-vm-analytics-detailed-guide/ When you come to the point when you shall install or update something stop! Now it is time for proxy stuff. Apt proxy settings sudo vi /etc/apt/apt.conf.d/proxy.conf Acquire { HTTP::proxy "http://proxy.invid.se:8080"; HTTPS::proxy "http://proxy.invid.se:8080"; } Linux For other Linux stuff you want to add this in root users... Continue Reading →

Brocade San Switch – Commands to know

Show switchshow - Indicators like no light or In_sync will be displayed portshow <port> - Provides report on errors on a port porterrshow - provides gist of port errors, look for delta of counters portstatsshow <port> - Provides details of port errors portstats64show - Extension of portstatsshow when 32 bit counters do not suffice, look... Continue Reading →

Getting strange error when installing vcli 6.7on ubuntu 18.10

Getting some error when try to run ./vmware-install.pl vcli Path::Class 0.33 or newer Socket6 0.28 or newer IO::Socket::INET6 2.72 or newer Net::INET6Glue 0.603 or newer How I did: sudo apt install -y perl-doc libmodule-build-perl libssl-dev libxml-libxml-perl libsoap-lite-perl libuuid-perl sudo apt-get install libcrypt-ssleay-perl libcrypt-openssl-rsa-perl sudo cpan Devel::StackTrace Class::Data::Inheritable Convert::ASN1 Crypt::OpenSSL::RSA Crypt::X509 Exception::Class UUID::Random Archive::Zip Path::Class Try::Tiny... Continue Reading →

CEH Practical #CEH @ECCOUNCIL

I have read many things about that CEH is not that good, but I think otherwise. I think everyone in IT schould attend a cource like this. You learn alot, some basic some advanced stuff. You need to start from somewhere, and this is a good starting point. You need to learn how to walk... Continue Reading →

Upload file to datastore, certificate error.

To fix this Browse to VirtualCenter Down at the right bottom on page press Download trusted root CA Unpack the zip file Open Certmgr.msc Go to Trusted Root Certification Authorities Rightclick on Certificates and All Taska/ Import Import the certificates that you unzipped before Restart Browser Done!  

Upgrade 5.0.0 to 5.5 from CLI.

When you have upgraded to 6.5 and did not notice that you had a 5.0.0. server in the Virtual Center. You can upgrade the 5.0.0 host from CLI with some simple commands. Download the offline Bundle for 5.5 zip file Download the zip file to ESXi host with your tool. (Vsphere client, Winscp or scp)... Continue Reading →

Some nice For Dummies Books.

Will add more as I stumble upon them. Network Virtualization for Dummies https://secure.vmware.com/47785_REG?touch=1&src=so_5bbb4d89277ef&cid=70134000001CYBq&src=so_5a314d05e49f5&cid=70134000001SkJn Micro‚Äźsegmentation For Dummies https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/vmware-micro-segmentation-for-dummies-book.pdf NVMe over Fibre Channel For Dummies Brocade Special Edition http://media.wiley.com/assets/7359/40/9781119399711.pdf Firewalls for Dummies https://doc.lagout.org/Others/Firewalls%20For%20Dummies%2C%202nd%20Edition.pdf Next Generation Firewall for Dummies https://www.csuc.cat/sites/default/files/docs/ngfw_for_dummies_ebook.pdf Cybersecurity for Dummies https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/education/cybersecurity-for-dummies.pdf Network Security in Virtualized Data Centers for Dummies http://gauss.ececs.uc.edu/Courses/c5155/pdf/netsec_virtdatacntr.pdf Virtualization for Dummies https://ssl.www8.hp.com/de/de/pdf/virtuallisation_tcm_144_1147500.pdf  ... Continue Reading →

Create wildcard from lets encrypt from another machine. And convert to p12

You need to verify by dns, that's what I read anyway. I was doing this from ubuntu 18.04 Install certbot: sudo add-apt-repository ppa:certbot/certbot sudo apt install python-certbot-apache Oneliners Certbot certonly --manual --preferred-challenges=dns --email roger.bergling@invid.se --server https://acme-v02.api.letsencrypt.org/directory --agree-tos -d *.portal.jkp.invid.se Add DNS txt vaule, you get this from above command Convert cert to p12: openssl pkcs12... Continue Reading →

Unable to migrate Virtual Center to 6.5 from 5.5. Certificate errors.

Easy one Uninstall VCenter Server from Windows Copy/Backup and¬† Remove C:\ProgramData\VMware\VMware VirtualCenter\SSL Reinstall same Virtual Center that was installed before.   Or you can follow this great blogg from¬†Zlatko Mitev http://vbuffer.com/vcenter-selfsigned-certificates/ Some notifcation from me: OpenSSL 0.9.8 is requried http://gnuwin32.sourceforge.net/packages/openssl.htm Deploying and using the SSL Certificate Automation Tool 5.5 http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&docTypeID=DT_KB_1_1&externalId=2057340 #When you are running openssl... Continue Reading →

Windows 2008 R2 cleanmgr.exe how to fix without reboot.

If not have desktop expirence installed and want to clean up C: on Windows 2008R2. Then copy below files the you are able to run clenmgr whitout reboot. Yo need to overwrite, because the old files will be there. C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_6.1.7600.16385_none_c9392808773cd7da\cleanmgr.exe to C:\windows\system32\ C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b9cb6194b257cc63\cleanmgr.exe.mui to C:\windows\system32\en-us\ The you can run cleanmgr.exe

Upgrade Datacore manually

How to manually upgrade Datacore. Download the Datcore Software Do you have DCSAdmin Password? If you don't, get it. If you have lost that password another blogpost is about to be done to explain howto change that. Connect to both nodes 1. Check System Health 2. Check version. Server Group DataCore Servers Version: 10.0.PSP5 Update... Continue Reading →

Locate firmware and disk model Ubuntu

apt-get install smartmontools smartctl --xall /dev/nvme0n1p2 smartctl 6.6 2016-05-31 r4324 [x86_64-linux-4.18.6-041806-generic] (local build) Copyright (C) 2002-16, Bruce Allen, Christian Franke, http://www.smartmontools.org === START OF INFORMATION SECTION === Model Number: PC401 NVMe SK hynix 512GB Serial Number: ES82N134010102J61 Firmware Version: 80003E00 PCI Vendor/Subsystem ID: 0x1c5c IEEE OUI Identifier: 0xace42e Controller ID: 1 Number of Namespaces: 1... Continue Reading →

Linux find file and directories and delete

Use the first to delete directories also second only files Skip -exec and all after just to search so you dont delete the wrong stuff. find . -name NAME_TO_FIND -exec rm -rf {} \; OR find . -type f -name NAME_TO_FIND -exec rm -f {} \;

Firmware upgrade Dell XPS 13 Ubuntu

sudo su fwupdmgr refresh fwupdmgr get-updates fwupdmgr update -v   or download the firmware update from dell .exe file and put into /boot/efi reboot press F12 ans choose firmare upgrade root@ubuntu:/boot/efi# ls EFI XPS_9370_1.5.1.exe  

MobilityGuard Tips och Tricks

Create http headers Base 64 encode mgpwd X-TEST¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬†PARM{base64encode(PARM[mgpwd])} MD5 Sum on password X-TEST¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬† ¬†¬†PARM{base64encode(PARM[mgpwd])} Saml Saml attribute to send in personal id if you login with e-id or webtoken definision by ldap1 attirubute under Database settings... Continue Reading →

Blog at WordPress.com.

Up ↑