Hi! Today I want to say a few words about a course I finished yesterday night! This review could have been a one liner: Take this course, if you don’t you are missing something really cool! Big shout out for making this possible. Really great work! https://www.apisecuniversity.com/ Corey J. Ball https://www.linkedin.com/in/coreyjball/ https://twitter.com/hAPI_hacker Dan Barahona https://www.linkedin.com/in/rdbarahona/ https://twitter.com/danbarahona But I want... Continue Reading →
PNPT Exam review and how did I approach the exam. Delivered by @TCMSecurity @thecybermentor #Cybersecurity #hacking
I must start saying that this exam was great. I started doing practical exam during my Novell eDirectory 991 course back in the days. And I loved them. This is another exam that I must say goes to my heart. I love the practical stuff. One other thing to say about this exam is that... Continue Reading →
Review on Practical Malware Analysis & Triage from @TCMSecurity and @HuskyHacksMK #malware #hacking #education #almostfree
Hi It is not often I do a post a review of web courses except in my journey post https://blog.invid.eu/2022/01/06/my-ocsp-and-pnpt-journey-from-the-beginning-during-and-i-hope-the-end-tcmsecurity-thecybermentor-offsectraining-pnpt-oscp-joplinapp-reconmap-bhinfosecurity-strandjs-hacking-pentesting/ But I did find this course so dam good that I need to shout it out. This course was amazing. I learned alot, new stuff for me. Matt Kiely @HuskyHacksMK who was the teacher is amazing,... Continue Reading →
How did I pass OSWP exam? Tips and Tricks. @offsectraining #PEN-210 #hacking #pentesting #wireless #INVID #dyslexia
Hi! Today I received my first certification from Offensive-Security (not counting PEN-100). If someone else is in progress of taking this course or thinking about it here are my tips and tricks. Here are some links from offensive security that you shall read if you will attend an exam from Offensive-Security. Verification https://www.credential.net/bac14e8c-24e1-43c5-a2c7-8d0751543caa Links https://help.offensive-security.com/hc/en-us/articles/360046904731 https://proctoring.offensive-security.com/student/login https://help.offensive-security.com/hc/en-us/sections/360008126631 https://help.offensive-security.com/hc/en-us/articles/360050299352 https://www.offensive-security.com/legal-docs https://help.offensive-security.com/hc/en-us/articles/360046293832 ... Continue Reading →
How to crack wireless networks. To get ready for PEN-210 OSWP certification. (For educational purpose only) @offsectraining #INVID Gruppen #OSWP #PEN-210
Time to do some wireless hacking. If you read my other posts you know that I am on a mission get OSCP. But sometimes you need to do something else. This is my attempt to do something else 🙂 Todo what I do in this post you need some hardware. At least a network card... Continue Reading →
Upgrade EOL Ubuntu server from 20.10 to 21.10. An upgrade from ‘groovy’ to ‘impish’ is not supported with this tool. @ubuntu @ubuntugeek #ubuntu #linux #EOL #upgrade
Hi all! Time to do a quick post that ran into this evening. As always I update my lab to be on the latest version all the time. But this one time I missed a machine. 🙂 We begin with EOL version of Ubuntu 20.10 The below picture says that we have a new version... Continue Reading →
My OCSP and PNPT journey from the beginning, during and I hope “the end”. @TCMSecurity @thecybermentor @offsectraining #PEN-100 #PEN-103 #PEN-200 #PEN-203 #WEB-100 #SOC-100 #PNPT #OSCP @joplinapp @reconmap @BHinfoSecurity @ActiveCmeasures @WWHackinFest @strandjs #hacking #pentesting
Intro Hi all! My plan is that under 2022 to take OSCP and PNPT exam. To get the full picture we start from the beginning. Why do I post this? Share knowledge is the simple answer, and I am getting old so I need to document everything I do. I think this is a good... Continue Reading →
Courses and Certifications that I have taking over the years. Knowledge is the key.
If you are interested in any just send me an email if you want information about them. This is mostly a reference page to other bloggposts. BHIS Webcast: Things NOT to Do in Pentest Reports: Tips, Tricks 2023-02-03 Future Red Team Rants: A breakdown in three parts 2023-01-26 All About Ansible - A Suite of... Continue Reading →
New version of hashcat is out. Time to test version 6.2.0 @HASHCAT #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #BRUTEFORCE #NVIDA #TESLAM60
Hi all! There is a new version of Hashcat out for you to try! Here you can download it https://hashcat.net/hashcat/ 312 different algorithms to use. The different attack modes are: Straight, Combination, Brute-force, Hybrid dict + mask, Hybrid mask + dict and Association Fixes There is 26 bugfixes in this release. New attack mode: Association... Continue Reading →
Attending Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-hours and want to run the VM in QEMU/KVM this is how I got it to work. @ActiveCmeasures #activecountermeasures #AIHunter #ThreatHunting #Beacons #Activecountermeasures @Zeekurity
Hi all! If you are like me attending the Threat Hunting Training Course named Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-Hours on Thursday and want to run the virtual machine in qemu/kvm native do it like this. Download and read the below link! https://www.activecountermeasures.com/cyber-threat-hunting-training-course/ As always start with the short version! Convert... Continue Reading →
Using fail2ban and the see what countries are trying a little to much to connect to my server. #Fail2ban #infosec #CyberSec #linux #awk #sed @ubuntu #linux4hackers
Hi! Goal for today is to get a list of what countries is trying to much to connect to my server using fail2ban. I know this is not a good thing to have port 22 open on internet, but sometimes you need that to prove a point. Install fail2banInstall geoip-binOpen port 22 on your server... Continue Reading →
CEH Master, LPT, eJPT and eCPPTv2. My thoughts about the exams ,courses and how I got there. @ECCOUNCIL @eLearnSecurity @ReadynezSocial @hackthebox_eu @RealTryHackMe @BHinfoSecurity @RedSiege @WWHackinFest @ActiveCmeasures
I am gonna try to explain how my dedicated my life to work and what it takes for me to get this far. This is gonna be about the penetrations exams that I took, but I would not have passed these if I did not took the Novell Netware Networking course back in the days.... Continue Reading →
Passing the eCPPTv2 certification from eLearnSecurity. 10 answers for you to pass the exam. Thanx to @eLearnSecurity @RealTryHackMe #eCPPTv2 @thecybermentor #infosec #hacking #pentest #pentesting #redteam #hackthebox #linux4hackers #blackbox
Got the eCPPTv2 Certification today. Nice way to start the year with. 7 days of penetration testing and 7 days of report writing. Total of 14 days. This is the schedule that you get. The penetration test is in form of black box. You can use what tool you want. Why invent the wheel again?... Continue Reading →
Adding automating pentest tools for WebApi to my hacking rig. Astra and Fuzzapi. @bsdbandit @RedSiege @TimMedin @Fuzzapi0x00 #OpenSource #Security #WebServices #API #webapi
This blog will be relatively short, but I thought the webinar I listened to was so interesting that I have to write about it. Webinar from Red Siege yesterday evening (21.00 Swedish time) regarding hacking webapi. Link: https://www.redsiege.com/api/. This was presented by @bsdbandit. I was blown away, this is really cool stuff. I was the... Continue Reading →
Explain in my own way how to do basic Buffer Overflow. With help from @RealTryHackMe #BufferOverlow #Hacking #INFOSEC #LINUX4HACKERS #pentest #pentesting #redteam
First this is not advanced BufferOverflow, more for me to write down and document what I did at tryhackme to get BufferOverflow Prep working. We start of what you need. Windows 7 box with ImmunityDebugger and mona installed. Access to the application ocsp.exe. You can do this online with tryhackme or download the application your... Continue Reading →
Why would you use masks with hashcat when you crack hashes in brute force mode. @hashcat #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #TESLAM60 #NTLM #BRUTEFORCE
In this post I will try to explain why it is important to use masks when you crack password from hashes with hashcat. The machine that I run hashcat on has 2 Tesla M60 card and running Linux. Why do I not use longer password in this test, I do not want to wait 7... Continue Reading →
Migrate from VirtualBox to QEMU/KVM on Ubuntu 20.10 as host. And get the VMs up and running. #qemu #kvm #libvirt #virtualbox #linux #virtualbox @ubuntu
Hi! I am have been running VirtualBox for my VMs on a Linux host for some time now. But when kernel 5.10 was installed there was some issue with compiling the drivers for VirtualBox. I think there is a workaround out there, but I needed to fix this asap. So I decided to migrate to... Continue Reading →
Using MindMap application when doing pentest or ctf! Up for you to decide. #MindMaps #freesoftware #kali #linux4hackers #linux #infosec #hacking #pentest #pentesting #redteam @kalilinux #ctf #bugbountytips @insilmaril
I was thinking about a nice and easy way to save a penetration test and come up with this.Use a MindMap application.There is a alot of MindMap application out there. I am running Linux on my machine so I ended up with VYM. (http://www.insilmaril.de/vym/)The nice thing about VYM is that it is free and comes... Continue Reading →
How to get autocompletion working great instead of good in powershell for linux. #powershell #pwsh #pwsh-preview #linux @ubuntu @powershell #autocompletion
My colleague @Schillman told me that you can get better autocompletion in powershell for linux. I thought that was interesting thing to try. Soon Sebastian will see the light in the tunnel and convert to a real operating system like linux and we will get more interesting things from him. This is what you can... Continue Reading →
Install PowerShell on Ubuntu 20.04 and add support for AzureAD. #powershell @ubuntu #linux @Microsoft @Azure #linux-guy-try-windows
Hi I want t run PowerShell on my Ubuntu machine and also add support for Azure. Because soon I will try to set up some federation in Azure. Below is from Microsofthttps://docs.microsoft.com/en-us/microsoft-365/enterprise/connect-to-microsoft-365-powershell?view=o365-worldwideIt is in Swedish but It says that Ubuntu 20.04 is not supported. I will be supported in the 7.1 release. The screenshot is... Continue Reading →
Installing Crowdsec on my hacking rig. How to block unwanted connections. Like bruteforce attacks on ssh. @Crowd_Security @DanielMiessler #hacker #bruteforce #ssh #cybersecurity #Security
I was reading on Daniel Miessler website and got really excited about his article about replacement to fail2ban. https://danielmiessler.com/study/crowdsec/?mc_cid=970356fcef&mc_eid=fa6207cba8 ). Please subscribe to his newsletter, really nice reading. Daniel explains this application in detail and I want to show how I did the installation on my machines. Some difference are there. I wont say it... Continue Reading →
How to install and run Salt from @SaltStack in my hacking rig. @VMware @thehackscast @thatch45 #saltconf @DjJimmyChunga #hacker #automation
Hi again! Today we are gonna take a look at Salt from Saltstack. On Sunday I was walking the dog and was listening to the podcast thehacks. I got very inspired by the podcast and wanted to really try this. I have never seen this product before. I have done some other tests in my... Continue Reading →
Install LogonTracer in my hacking rig. #blueteam @jpcert_en #LogonTracer #ubuntu #linux #infosec #logging #hacking @Docker #logontracer @neo4j
It is time to test LogonTracer from @jpcert_en you can get your copy from https://github.com/JPCERTCC/LogonTracer From the website:LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows active directory event logs. We start with a new installation of ubuntu. The servername for this is Logon. The installation is not in this post.... Continue Reading →
Add linux and windows machines to SecurityOnion Kolide Fleet @securityonion #opensource #qsquery #fleet @Kolide #linux @BHinfoSecurity
We have now come so far that we want to add things in my installation of SecurityOnion. And we will start with how to add Linux and Windows boxes to Kolide Fleet. I do not know if this is the right way but after a couple of hours I was able to see the vm:s... Continue Reading →
Installing Security Onion 2.3 in my hacking rig. @securityonion #opensource @Elasticsearch #zeek #grafana #qsquery #wazuh #thehive #playbook #kibana #squert #snort #cortex #fleet #suricata #logstash @BHinfoSecurity @elastic @TheHive_Project @grafana
I must thank @BHinfoSecurity to get my interest in this. There webinars is great, especially 30 minutes before the real webinar begins.Now lets get started. As you have seen I did installation of 16.04 version before. My mistake, to tired! No I have to do this again with the new version. Like 16.04 version this... Continue Reading →
Installing Security Onion 16.04 in my hacking rig. @securityonion #opensource @Elasticsearch #zeek #kibana #squert #snort @BHinfoSecurity @debthedeb
Hi, now after some other installations in my "lab" it is time to look at logging. I got really inspired by webinars from BlackHills, so a big shout out to them. They are doing great work to spread there knowledge to others!And soon I WILL get my backdoor and breaches card game! I do not... Continue Reading →
How to update my hacking rig (Linux and Windows) using ansible. #ansible #ubuntu #linux #infosec #windowsupdate #hacker #automation
I have my vm:s up and running now, but I like my rig to be patched and updated, even if I only have 7 machines I want to centralize update procedure. I have chosen to do this with Ansible. As this is a demo site that I am setting up. Security of some configuration is... Continue Reading →
Hachcat benchmark numbers with a VM with Tesla M60 card PCI passthru. #ubuntu #linux4hackers #hashcat #linux #infosec #hacking #pentest #pentesting #redteam #invida #teslam60
I am running hashcat in a VM (ubuntu 20.04) with a PCI passthru NVIDIA TeslaM60 card. This is my first rig with a graphics card so I have no referense to the numbers below. But here is my benchmark test so you can compare. Running Cuda so I can access all memory on the card.... Continue Reading →
How to access internal machines with ssh tunneling. Tunnel rdp thru a jumpstation with ssh. #infosec #hacking #pentest #pentesting #redteam #linux4hackers #kali #parrotos #linux #linux4hackers #ssh
This is follow up of the previous post regarding my rig. How do I access this where ever I am? I use SSH tunneling for that. If I loose connection for some reason I always use tmux on the target so I can reconnect to the same session as before. We start with a picture,... Continue Reading →
How did I create hacking rig for ethical hacking. Based on VMware with Tesla M60. #infosec #hacking #pentest #pentesting #redteam #hackthebox #tryhackme #linux4hackers #ctf #kali #parrotos #linux #godaddy #linux4hackers
My goal with this project was to create a hacking rig that I can use when doing hackthebox, tryhackme and other ctf:s. I was lucky to get my hands on a server with Tesla M60 card. My other goal was also to have a server that I can use in phishing tests, and show others... Continue Reading →
How to get IPv6 and IPv4 support with proxychain4 running kali. #hack #kali #linux #infosec #hacking #pentest #pentesting #redteam #proxychain4
I wanted to use proxychain with IPv6, ended up with this configuration. If you have not install proxychain4 do that now! Tor configuration file add below /etc/tor/torrc SocksPort [::1]:9050 SocksPort 127.0.0.1:9050 ClientUseIPv6 1 ClientPreferIPv6ORPort 1 ClientPreferIPv6DirPort 1 Proxychain4 configuration file. Add the information below in the file under [ProxyList] /etc/proxychain.conf socks5 :: 9050 socks4 127.0.0.1... Continue Reading →
If you are attending “Getting Started in Security with BHIS and MITRE ATT&CK with @strandjs” next week and running Linux and VirtualBox. How to import the machine? @BHinfoSecurity @WWHackinFest @debthedeb #cybertraining #hackers #CyberSecurity #infosec
I am running Kali and VirtualBox. When running Virtualbox there are some issues. If the machine that you are running AMD this perhaps works. I am running INTEL so that sucks. INTEL + VirtualBox + Wsl v2 = Do Not Work For Me. There is a problem running wsl v2 in VirtualBox with Windows 10.Not... Continue Reading →
How to disable systemd-resolved. Problem to get resolve.conf updated with NetworkManger #ubuntu #networkmanager #linux #INVIDGruppen
When you running systemd-resolved you have entry in /etc/resolv.conf that points to nameserver 127.0.0.53. When you troubleshoot sometimes you do not want this. This is how I did it: Disable systemd-resolved sudo systemctl disable systemd-resolved.service sudo systemctl stop systemd-resolved 2. Edit network-manager settings files /etc/NetworkManager/NetworkManager.conf and dns=default roger@xps13:~$ cat /etc/NetworkManager/NetworkManager.conf [main] plugins=ifupdown,keyfile dns=default [ifupdown] managed=false... Continue Reading →
How to get Bluetooth headset working both as headset and high fidelity playback A2DP Sink with nice sound. @system76 #Pop!_OS #linux #pop_os #ubuntu #Linux #gnome
I was unable to switch my bluetooth headset between different audio profiles. Did read alot of blogs and edit blutooth and pulsaudio files to get this to work. Did not get sound in the headset when I went into settings and test my sound. It says that I test my headphone but the sound went... Continue Reading →
How to get systray icons for programs. @system76 #Pop!_OS #linux #pop_os #ubuntu #Linux
I installed Pop!_OS, clean install. After that I installed some application that uses system tray. But some icons do not show up. I am running latest version and DELL XPS 13 9370. I does not matter what extension I enable. Fix that works Install gnome-tweaks sudo apt-get install gnome.tweaks 2. Now install system tray extension... Continue Reading →
Create file with hostnames from website with cewl, then scan the webserver for vhosts with Metasploit vhost_scanner to find hidden virtual hosts on webserver. #infosec #hacking #pentest #pentesting #redteam #hackthebox #ctf #linux4hackers
We start to collect possible hostnames from websites with Cewl cewl http://10.10.10.1 -w cewl.txt You can also use some other switches like -d = deph to look on the website for words -m = minimum wordlengh -w = outputfiel So that the final command can look like this: cewl http://10.10.10.1 -d 5 -w cewl.txt When... Continue Reading →
Terminator + tmux = perfect match? Starting and attaching tmux sessions from terminator automatic with bash. @kalilinux #kali #kalilinux #linux#linux4hackers #linux #tmux #terminator #infosec #hacking #pentest #pentesting #redteam
My goal was to start Terminator, that's the terminal program I use and the reattach to tmux sessions in the three windows that I have. If I close terminator and started it again I wanted the tmux sessions to reattach to the old ones. And I i close tmux I wanted the same tmux windows... Continue Reading →
Running Linux, is it possible to use OneDrive and Google Drive. Yes and it works. #linux #onedrive #googledrive #insync @insync
I do not say anything about security issue regarding this, but I needed a way to sync my Companies OneDrive and my private stuff to Google Drive. I tried a lot of different cli application, but those did not work for me. I have now found an application that works, and I only need one... Continue Reading →
How to import missing key from all the repository in a one liner. @kalilinux #kali #kalilinux #linux #gpgkey #NO_PUBKEY
You get this error when you apt-get update The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 1A1C1C101311121 How to import missing gpg key from all the repository in a oneliner. Thanx to https://www.linuxuprising.com/2019/06/fix-missing-gpg-key-apt-repository.html sudo apt update 2>&1 1>/dev/null | sed -ne 's/.*NO_PUBKEY //p' | while read key; do if... Continue Reading →
CORE-IT is a FREE virtual conference hosted by Chappell University. The online event begins March 24th at 9 am Pacific Time. #wireshark #nmap #darknet @torproject #kismet #tcp #dns @LauraChappell https://www.engagez.net/coreit1#lct=entrance
I got an email regarding a free Virtual Conference 2020! Could be something real nice! https://www.engagez.net/coreit1#lct=entrance Agenda here: https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf https://coreit.s3.amazonaws.com/CORE-IT_Agenda-v1f.pdf
Fishing with Raspberry Pi, Kali, Auto connect to VPN, Auto register domain with GoDaddy, Automatic SSL cert with Letsencrypt, Run Golang, Run Gophish @letsencrypt @golang @kalilinux @GoDaddy #kali #raspberrypie #linux #infosec #hacking #pentest #pentesting #redteam #gophish
This is just for demo, I used root as user, you should perhaps consider other user to do this. Installation of Kali Download Kali Image https://www.offensive-security.com/kali-linux-arm-images/ Flash the SDCARD with etcher on you Kali box or any other burning program. Put the sdcard in the PI and boot OpenVPN Autostart Download opvpn conf file from... Continue Reading →
Virtual Box empty gui when running darkmode in Linux. @kalilinux #kali #kalilinux #linux #VirtualBox
When you start Virtualbox in darkmode theme, you do not see anything in the gui. Start VirtualBox with a style... Available styles: cleanlooks, gtk2, cde, motif, plastique, Windows, Fusion virtualbox -style Windows %U Without Style With Style
How to exploit Active Directory ACL based privilege escalation path with Bloodhound and aclpwn.py. Then collect the hashes, if you are lucky to get that level of access with secretdump.py #kali #kalilinux #hacking #pentest #pentesting #redteam
This was done from Kali box. Of course the Sharphound was ran on a compromised computer. Used application Bloodhound and Sharphound ( https://github.com/BloodHoundAD/SharpHound ) aclpwn ( https://github.com/fox-it/aclpwn.py ) Steps to do it Get output with sharphound and put that on our kali box use -all when run the Sharphound. Start neo4j and bloodhound import the... Continue Reading →
Linux Autostart application with delay and also minimize the application after start. #kalilinux #linux
Some application start in full screen and I do not want that. I want them minimized when I login. In this case I am running Kali 2020.1. You need to install a program. sudo apt-get install wmctrl The I did create a app directory in home, In this directory I created app.sh file with the... Continue Reading →
How to turn of power management on the wifi in kali 2010.1 (or any other distro using NetworkManager). @kalilinux #kali #kalilinux #linux #NetworkManager
Sometimes there are issues with speed, performance, lost of connection to access points. This can be helpful in some configurations. Before: iwconfig wlan0 wlan0 IEEE 802.11 ESSID: Mode:Managed Frequency:5.26 GHz Bit Rate=6 Mb/s Tx-Power=20 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on Link Quality=56/70 Signal level=-54 dBm Rx invalid nwid:0 Rx invalid crypt:0... Continue Reading →
Kali 2020.1 XFCE. Unable to start any program from gui that requires root privilege. Synaptic just do not start. Firewall-applet just say unable to communicate. It starts fine from cli. @kalilinux #kali #kalilinux #linux
I just installed Kali weekly release (2020.1) with KDE and XFCE and all things seems to work very fine. But one thing with XFCE is that when I try to start things fron XFCE that use root permission it wont work. Strange errors or the applications just do nothing. gksu is no longer availble pkexec... Continue Reading →
Git pull with subdirectories. Instead of every subdirectory one by one.
If you have for example a github directory in our home directory and want to update all the applications at the same time, instead of going in to every subdirectory and git pull from there. You can do every subdirectory at the same time for i in */.git; do ( echo $i; cd $i/..; git... Continue Reading →
How to get VMware Remote Console on Kali 2019.4
Thanx to Dave Parker http://computersalad.blogspot.com/2018/09/using-vmware-remote-console-on-debian.html sudo su cd /usr/lib/vmware/bin mv vmrc vmrc.old Create a new vmrc file in /usr/lib/vmware/bin with this content #!/bin/bash LIBDIR="/usr/lib/vmware/lib" BINDIR="/usr/lib/vmware/bin" LD_LIBRARY_PATH="" for dir in $(find ${LIBDIR} -type d) ; do LD_LIBRARY_PATH="${dir}:${LD_LIBRARY_PATH}" done export LD_LIBRARY_PATH ln -s ${BINDIR}/appLoader /tmp/vmrc /tmp/vmrc $* rm -f /tmp/vmrc exit 0
Getting Powershell to work with Ubuntu 19.10 (budgie). Couldn’t find a valid ICU package installed on the system
You get error like this: Process terminated. Couldn't find a valid ICU package installed on the system. Set the configuration flag System.Globalization.Invariant to true if you want to run with no globalization support. Did not work with powershell preview sudo snap install powershell --classic export DOTNET_SYSTEM_GLOBALIZATION_INVARIANT=1 pwsh
Ubuntu Budgie 19.10 mousepad right click how to switch from two finger click.
Standard is to use 2 finger and click to get right mouse click. You can switch to "standard" Right click on mouse pad: gsettings set org.gnome.desktop.peripherals.touchpad click-method areas To get back to two fingers click: gsettings set org.gnome.desktop.peripherals.touchpad click-method fingers
Ubuntu running Librenms with MariaDB don’t start after 100% disk full.
I am trying out Librenms under Ubuntu 18.04. I did dumb thing and sized the disk to small. So today my disks was used 100%. I expand the disk (lvm) and resize the partitions. But the mariaDB did not start. What I did was, I removed this file /var/lib/mysql/tc.log rm /var/lib/mysql/tc.log systemctl start maridb.services And... Continue Reading →
Get service tag from Linux on Dell machine
sudo dmidecode | grep "Serial Number" You get something like this: Serial Number: 21XHTN1
Update all git applications in a directory with one command.
This oneliner update every git cloned application in the the directory /home/user/github/"applications" cd /home/user/github Command: for d in *; do pushd $d && git pull && popd; done
Microphone in Windows 10 1803 or later under VirtualBox, Ubuntu 18.10 as host.
Microphone seems not to work in any application, audio out is working in 3,5mm or in usb headset but not any mic. Update Virtual Box in my case I am running 6.04 Install Guestadditions Control panel Go to privacy Choose Microphone Choose to use the mic in apps Then my mic was working!
Getting strange error when installing vcli 6.7on ubuntu 18.10
Getting some error when try to run ./vmware-install.pl vcli Path::Class 0.33 or newer Socket6 0.28 or newer IO::Socket::INET6 2.72 or newer Net::INET6Glue 0.603 or newer How I did: sudo apt install -y perl-doc libmodule-build-perl libssl-dev libxml-libxml-perl libsoap-lite-perl libuuid-perl sudo apt-get install libcrypt-ssleay-perl libcrypt-openssl-rsa-perl sudo cpan Devel::StackTrace Class::Data::Inheritable Convert::ASN1 Crypt::OpenSSL::RSA Crypt::X509 Exception::Class UUID::Random Archive::Zip Path::Class Try::Tiny... Continue Reading →
SSH to an old machine with sha1. Unable to negotiate with ipadress port 22 no matching key exchange method found. Their offer: diffie-hellman-group1-sha1
Unable to ssh to old versions of sshd Unable to negotiate with ipadress port 22 no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 Use this at our own risk, this is not secure... ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 username@ip(or name)
Add firewall rules to firewalld in Ubuntu 18.10
I wanted to drop all ICMP traffic, tried to create the rules in the gui, but no progress. I did miss the direct rules, should work in the gui also. So I did it with the cmd command: firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 0 -p icmp -j DROP firewall-cmd --permanent --direct --add-rule ipv6... Continue Reading →
Locate firmware and disk model Ubuntu
apt-get install smartmontools smartctl --xall /dev/nvme0n1p2 smartctl 6.6 2016-05-31 r4324 [x86_64-linux-4.18.6-041806-generic] (local build) Copyright (C) 2002-16, Bruce Allen, Christian Franke, http://www.smartmontools.org === START OF INFORMATION SECTION === Model Number: PC401 NVMe SK hynix 512GB Serial Number: ES82N134010102J61 Firmware Version: 80003E00 PCI Vendor/Subsystem ID: 0x1c5c IEEE OUI Identifier: 0xace42e Controller ID: 1 Number of Namespaces: 1... Continue Reading →
Linux find file and directories and delete
Use the first to delete directories also second only files Skip -exec and all after just to search so you dont delete the wrong stuff. find . -name NAME_TO_FIND -exec rm -rf {} \; OR find . -type f -name NAME_TO_FIND -exec rm -f {} \;
Create Wifi TLS connection with Ubuntu 18.04
Depends on how the wifi is configured you need to have access to CA server (windows in this case) Login for the user, for creating the certificate. Policy to allow export of private key. Steps: Download CA cert from server: https://server.com/certsrv Convert CA.CER to PEM openssl x509 -inform der -in ca.cer -out ca.pem Create... Continue Reading →
Add Follow Me Printer in Kali via SMB
Start Cups /etc/init.d/cups start Surf to http://127.0.0.1:631 Add Printer: Between domain and username %5C If you have space in the share name add %20 smb://DOMAIN%5CUSERNAME:PASSWORD@SERVER/SHARP%20Follow%20Me Name the printer: Choose driver or add a ppd file:
Firmware upgrade Dell XPS 13 Ubuntu
sudo su fwupdmgr refresh fwupdmgr get-updates fwupdmgr update -v or download the firmware update from dell .exe file and put into /boot/efi reboot press F12 ans choose firmare upgrade root@ubuntu:/boot/efi# ls EFI XPS_9370_1.5.1.exe
Kali curl /usr/lib/x86_64-linux-gnu/libcurl.so.4: version `CURL_OPENSSL_3′ libcurl3 (>= 7.16.2)
Error when patching latest version /usr/lib/x86_64-linux-gnu/libcurl.so.4: version `CURL_OPENSSL_3' apt-key adv --keyserver keyserver.ubuntu.com --recv-keys D1DAC98AF575D16E Adding this and downgrade the curl worked for me. https://launchpad.net/~xapienz/+archive/ubuntu/curl34 My application that was the problem was sky from tel.red
How to install PowerCli on Kali
curl https://packages.microsoft.com/keys/microsoft.asc | sudo apt-key add - Add source deb [arch=amd64] https://packages.microsoft.com/debian/stretch/prod stretch main sudo apt-get update sudo apt-get install -y powershell pwsh Install-Module -Name VMware.PowerCLI -Scope CurrentUser Update-Module VMware.PowerCLI
Create USB bios bootble
geteltorito firmware.iso > firmware.img dd if=firmware.img of=/dev/sdb
Disable dnsmasq in ubuntu
Disable the systemd-resolved service and stop it: sudo systemctl disable systemd-resolved.service sudo service systemd-resolved stop Put the following line in the [main] section of your /etc/NetworkManager/NetworkManager.conf: dns=default Delete the symlink /etc/resolv.conf rm /etc/resolv.conf Restart network-manager sudo service network-manager restart
XFCE set google chrome as default browser even for evolution
gio mime x-scheme-handler/http google-chrome.desktop gio mime x-scheme-handler/https google-chrome.desktop