I recently only had SSH Access into an Environment which had a Web Based GUI I needed to access. I used SOCKS as a Proxy (Built into OpenSSH) to access the UI by performing the following on my Mac:
As I had SSH Access i used the following command
- ssh -D 443 email@example.com
- Ubuntu Version 12.04 or greater
- Kernel release 3.10 of higher
Run the following
- sudo apt-get update
- sudo apt-get install apt-transport-https ca-certificates
- sudo apt-key adv –keyserver hkp://p80.pool.sks-keyservers.net:80 —recv–keys 58118E89F3A912897C070ADBF76221572C52609D
Check to see if the following file exists: /etc/apt/sources.list.d/docker.list
For this example i will create a user account called newuser – this will need to be replaced by whatever you want your account to be called.
Create new user account: sudo adduser newuser
Enter and confirm a password and complete the Information if necessary:
To check the Kernel release
To check the Kernel Version
To check your Ubuntu release
Create a directory to mount the cdrom
sudo mkdir /mnt/cdrom
Now need to see where the cdrom is mapped to, so run:
I use USB Drives quite a bit to move data between Windows, Mac and Linux Devices. Sometimes when i go to re-format them they only show as 200MB capacity
As I’m on a Windows machine, open the Command Prompt (CMD) and type: diskpart
Type: list disk to see your drive, in my case here, its Disk 2
I recently ordered a Raspberry Pi 3 (currently £30.80) with an SanDisk Ultra 8 GB microSDHC Card (Currently £4.35) with the intention of installing Kali 2.0. For this setup i used my Windows 10 PC.
This post will cover setting up the SD Card and installing Kali
I downloaded the ARM Image from the Offensive Security Site, which comes down compressed. I also downloaded Win32 Disk Imager and installed it.
I already had 2 external Monitors running from my MacBook by using 2 x miniDP to HDMI adapters. I was using the fairly standard ones that come with the Mac but I have another Monitor which i used for my Lab PC (Windows) and Figured I could connect this to my Mac and run Microsoft Remote Desktop to connect to it, removing the extra Keyboard and mouse off my desk.
For this install I chose to use MySecureShell as a small and quick way to stand up an SFTP Server. As usual all commands are in Bold.
Log into your Ubuntu Server with Admin credentials:
Sudo apt-get install mysecureshell
cd /etc/apt (more…)
run ifconfig to find the name of your Interface. Normally these would be eth0, eth1 etc but in my Virtual Environment they are different
Homelab Page updated:
Originally I planed on using a HP DL380 G5 and a few HP Microservers for my lab – but i changed my mind.. Instead I opted for a HP XW6600 Workstation: HP XW6600
I got this off Ebay for about £100 – this was fairly Barebones but had a Semi Decent Xeon Processor – E5440 @ 2.83GHz
Reasons for the Workstation:
- Supports Virtualization
- Can take 32GB of RAM – See Update 2
- Plenty of Space in the chassis for upgrades / expansion
Navigate to Storage and highlight the Volume you just created and Select create zVol
Enter a Volume name and the size, if using GB be sure to enter the g after the number. Select Add zvol
Navigate to Services on the top bar and turn on iSCSI by clicking on the Toggle
Part 2 – Basic Setup
Make sure the FreeNAS Server is shutdown
Add new Disk to the FreeNAS Server
Ensure SSH / Port 22 is open and the Services are started as per previous post Enabling SSH
Download the relevant VIB File from the Flings Website here:
Open up your SFTP / FTP Application; In my lab I am using WinSCP
Copy the VIB to a Datastore on the ESXi Server
PuTTy onto the host and run:
esxcli software vib install -v /vmfs/volumes/[DATASTORE]/esx-tools-for-esxi-9.7.1-0.0.00000.i386.vib -f
After a short while you should receive the following Successful message:
Summary – From the Official FLINGs Website: https://labs.vmware.com/flings
Note: See Instructions tab for downloads.
This VIB package provides a VMware Tools service (vmtoolsd) for running inside a nested ESXi virtual machine. The following capabilities are exposed through VMware Tools:
- Provides guest OS information of the nested ESXi Hypervisor (eg. IP address, configured hostname, etc.).
- Allows the nested ESXi VM to be cleanly shut down or restarted when performing power operations with the vSphere Web/C# Client or vSphere APIs.
- Executes scripts that help automate ESXi guest OS operations when the guest’s power state changes.
- Supports the Guest Operations API (formally known as the VIX API).