A useless CyberSec Engineer & Linux/Unix Sysadmin
This is my writeup for the Plotted-EMR room/machine of TryHackMe.com platform. Remember this is just how I solved/owned the machine, maybe there are different and fast paths but…
Machine Tip: Enumeration is key!
The machine is rated as an hard machine and yes…it is! I solved it with a mixture of techniques and different escalations. Thanks a lot to sa.infinity8888 for this amazing machine! The best part you can learn with this machine is abusing the wildcard injection and the cap_fowner capability.
This is my writeup for the anonymous room/machine of TryHackMe.com platform. Remember this is just how I solved/owned the machine, maybe there are different and fast paths but…
Machine Not the hacking group
The machine is called anonymous, room anomymous, the link is https://tryhackme.com/room/anonymous. This is rated as a medium machine but honestly is more an easy one!
With this machine you can refresh privilege escalation and how to gain power using an anonymous ftp server.
This is my writeup for the wonderland room/machine of TryHackMe.com platform. Remember this is just how I solved/owned the machine, maybe there are different and fast paths but…
Machine Fall down the rabbit hole and enter wonderland.
The machine is called wonderland, room wonderland, the link is https://tryhackme.com/room/wonderland. This is a medium machine, I spent more time than I tought but…it’s a really good exercise completing it! With this machine you can refresh a lot of good think with privilege escalation and how to read an elf file.
I did it, I passed the exam attempt and I “own” now the Offensive Security Certified Professional certification. The OSCP certification by Offensive Security is the first - serious - step you may try to become a certified penetration tester, it’s recognized everywhere and almost everyone knows it.
I know, yes I know…you may be the best pentester or sysadmin without any certification, it’s true. I’m the first who say it, my mentor - my dear friend Franco - as far as I know never took an IT certification and during the last 20 years (my IT years, he is active since early ‘90) and I never found someone better than him.
In this final part of the Foreman & Katello setup guide I’ll finish what was planned! I’m sorry if I’m late but I had a lot of work to finish! Thanks to S. Kerr, F. Malali, P. Klassen, A. Salgado & D. De Jager for their support and feedbacks! I really appreciated your emails guys and if you check the previous guides (part 1 and 2) I corrected the mistakes.
In this second part I’ll explain how to:
Creation of the Katello Client Product (or another Product) Configuration of Ansible, Puppet and Remote Execution in the third part I’ll explain how to:
Configuration of VMWare and virt-who Configuration of Provisioning Provisioning of new server and KickStart configuration Configuration of OpenSCAP Final Setup Creation of Katello Product As written in the first article, I added the Katello repository to my servers registered to Foreman, so I’m using an external repository and now I want to use an internal one, as the same of EPEL.