Skip to main content

Posts

Showing posts from August, 2023

Make Permanent Changes on WSL - /etc/resolv.conf

  sudo bash #add an entry in resolv.conf - update ip address as required echo "nameserver 8.8.8.8" >> /etc/resolv.conf #Make the file Immutable; if you want to update the file again later - run chattr -i /etc/resolv.conf to make it mutable again chattr +i /etc/resolv.conf # add an entry in wsl.conf sudo nano /etc/wsl.conf #Add the below lines [boot] systemd=true [network] generateResolvConf = false exit wsl --shutdown wsl #You should observe the changes are now permanent.

Using Python Virtual Environment

  # Install venv sudo apt install python3-venv #Create a new virual env python3 -m venv .venv/project_name # Get into virtual env - now you are in vir env source project_name/bin/activate #deactivate vir env deactivate #install a package python -m pip install requests pip install --upgrade --force-reinstall --ignore-installed -r requirements.txt \ > --extra-index-url file:///$PWD/lib #list available packages python -m pip freeze Resolving externally-managed-environment × This environment is externally managed - Create a virtual env or - install the packages syste m wide --break-system-packages pip install requests --break-system-packages

VMware ESXi Pentesting

  Reference Links 1. Soap API Guide 2. Ports and Services 3. Vcenter Security Guide Port 902 - VMWare Authentication Daemon - It is possible to brute force credentials on Port 902 using metasploit - 902 Port is available only when remote access is required. - Uses Windows Domain Login Creds - unless local access is set. - Generally, this kind of service is not logged - Recommended to brute force 902 port instead of RDP or ssh when. #Bruteforcing msfconsole use auxiliary/scanner/vmware/vmauthd_login #Access nc 10.10.10.10 902 USER root PASS toor