OpenWRT OpenVPN bridge

OpenWrt Project is a Linux OS targeting many embedded devices. Instead of trying to create a single firmware it provides a fully writable filesystem with package management. This is free starting from the application selection and configuration provided by the vendor and allows you to customize your device through the use of packages to suit any application. OpenVPN is a virtual private network (VPN) that implements techniques to create secure point-to-point or site-to-site connections in Read more…

Pfsense create VLAN over LAGG

Setting up VLANs over LAGG interfaces in pfSense can increase bandwidth and redundancy while keeping your network segmented and secure. In this tutorial, you’ll learn how to configure everything properly and avoid common pitfalls. pfSense project is a free network firewall distribution based on FreeBSD with a custom kernel and including third party free software packages for additional functionality. pfSense software is able to provide at least the same functionality or more of common commercial Read more…

Gitlab build own composer package

GitLab is a single application for the entire software development lifecycle. From project planning and source code management to CI/CD, monitoring, and security. Composer is a tool for dependency management in PHP. It allows you to declare the libraries your project depends on and it will manage (install/update) them for you. Building your own composer packages is a well-used practice in industry for internal modules or to build official ones but hosted in your local Read more…

WordPress show wrong IP of visitors

On a regular web host, WordPress has no problems when display the right IP address of visitors, comments, etc. However, on some servers WordPress site will not display the correct IP address in the comments dashboard and other places. Depending on the software installed on the server and how is it configured, the client IP address may not be forwarded. WordPress has no built-in option to forward client IP address so to fix an incorrect Read more…

SSH using Yubikey

With YubiKey you can protects access to computers, networks, and online services. YubiKey 5 Series eliminates account takeovers by providing strong phishing defense using multi-protocol capabilities that can secure legacy and modern systems. It provides a range of authentication choices including strong two-factor, multi-factor and passwordless authentication, and seamless touch-to-sign. In order to use a Yubikey as 2FA for securing a SSH connection to a server you need to prepare server for this. Install Yubikey Read more…

Grafana S.M.A.R.T. disk monitoring

For today we will use a bash script to monitor S.M.A.R.T. disks of a server. All script output will be stored in a text file with extension prom and exposed via node_exporter. Enable node_exporter text collector Create a folder and in your node_exporter service add the following parameter: Download script from here and add it to /etc/crontab the following line which will execute script at every 5 minutes; Now import the following dashboard in grafana Read more…

Reset admin password procedure on EMC ESRS VE

The most important thing is that the root and admin passwords for the EMC ESRS VE virtual appliance are configured during VA deployment and there is no default password. In EMC ESRS VE version 3.06 or newer you can login to the VM console or through SSH as root and run the following command to reset admin’s password:

USB over IP

The need for a USB over IP happen when your VM is hosted on a hypervisor like HyperV, VMware and so on. For VMware you can mount USB on one node but downside is that VM will always stay on the same node. Using a USB over IP solution VM can migrate between hosts which is proffered solution. For configuring USB over IP we have 2 options: usbip project VirtualHere The first solution works fine Read more…

VPN lan-to-lan (Cisco and pfSense)

What is a VPN lan-to-lan or also names site-to-site? A lan-to-lan virtual private network (VPN) is a connection between two or more networks, such as a head office network and a branch office network. Many companies use lan-to-lan VPNs to leverage an internet connection for private traffic as an alternative to using MPLS circuits. Lan-to-lan VPNs are frequently used by organizations with multiple offices in different locations that need access and use of corporate network. With a lan-to-lan Read more…

Analyzing malware inside a Word file

Today we will see how we can analyze a infected Word file. A word file can be infected in multiple ways, some are more interesting and complex but some are not. These days I’ve received a Scam Email which was looking near like a true one with a nice Word document attached. I was curious what is inside. So let’s begin with what I did and the most important part is how I did. First Read more…