Author: Michael

Home / Author: Michael

Hi everyone,

In this post we will be making our own deployment VM to deploy Tanzu Kubernetes Grid on VMware Cloud on AWS. There is a demo appliance, but I would like to use the latest versions of everything. If you would like to know more about Tanzu Kubernetes Grid, please check out this link. This also works for on-prem, but the UI is different for NSX-T for the on-prem manager.

I’d like to give a special shout-out to the TKG Demo Appliance which can also be used and it includes demos and already has the programs. You can get it here and skip this section.

First we need a virtual machine to deploy it from. From my experience, deploying through a VPN does not work.

We start with an image. In my case, I like to use the Ubuntu Server cloudimage which you can get here.

Create a NSX-T segment in the VMware Cloud on AWS console for TKG. Also create a management group and rule so that the TKG segment can access the vCenter.

When you have it deployed, resize the VM. In my case I use 8 CPUs and 16GB of memory, but this is not something I really looked into. Once it’s on, login as the ubuntu user and execute this to become the root user:

sudo su -

And then we get to installing.

We will need the tkg CLI, kubectl and docker. Visit https://vmware.com/go/get-tkg and download the TKG CLI for Linux, the Photon v3 Kubernetes v3 Kubernetes vx.xx.x OVA (get the latest version), Photon v3 capv haproxy vx.x.x OVA and VMware Tanzu Kubernetes Grid Extensions Manifest x.x

You can then SCP the .gz and .tar.gz files over to the VM, or upload them somewhere and then wget/curl them. The two OVAs should be uploaded to a Content Library that the VMC on AWS SDDC can access. Once you have done that, you deploy one VM from each OVA, and then convert this to a template.

To set up the deployment VM further, let’s install docker. We can do this with a one-liner:

curl https://get.docker.com | sudo sh

Once this is installed, get kubectl:

curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"

Then we extract the files:

tar xvf filename.tar.gz
gunzip filename.gz

And we run:

mv kubectl /bin/
mv tkg-linux-amd64-rest_of_filename /bin/tkg

Now we are ready. Let’s fire up a second SSH session. On the first SSH session, we run the init with the UI:

tkg init --ui

This will run the installer UI on port 8080. In the second SSH session, be on a new line that you have not typed into yet. Then press ~ (shift ` in most cases) and then C. Then type:

-L 8080:localhost:8080

This will open up port 8080 on your local system and forward it to port 8080 on the TKG VM.

Visit http://localhost:8080 and let’s get started.

Click on deploy under VMware vSphere.

In my case, I fill in the local IP of the vCenter, with the [email protected] user and the password. I press connect, then select a datacenter and fill in a public SSH key. (If you don’t have any, run ‘ ssh-keygen ‘ and then ‘ cat .ssh/id_rsa.pub ‘

Click on next. Now we select if we want a single node development management cluster, of the production one with three management nodes. I select the production one for my case and select the appropriate size, which I will use medium for. Then you can fill in a management cluster name, and select the API server load balancer. You can also select the worker node instance type along with the load balancer and click on next.

Now we select a VM Folder to put it into, select the WorkloadDatastore for the datastore and the Compute-ResourcePool or a resource pool under it. Click on next.

Select the TKG network and in my case I leave the CIDRs as default. Click on next.

Select the OS image and click on next.

Click on review configuration and then on Deploy Management Cluster. Now we sit back and wait.

15 minutes later, and we are done for the management cluster!

Now we can deploy our first workload cluster. Go to the root shel where you run the init, and type:

tkg create cluster clustername --plan=prod/dev

# Example:
tkg create cluster tkg-workload-1 --plan=prod

Once that finishes, run:

tkg get credentials clustername

# Example:
tkg get credentials tkg-workload-1

And now you’re ready to start deploying applications. In the next posts, I’ll cover some demos and assigning an VMC on AWS Public IP to one of the kubernetes load balancers.

Thank you for reading, if you have any questions feel free to contact me.

How I got into IT

July 21, 2020 | IRL, Virtualization | No Comments

Hi everyone,

This post will be all about me and how I got into the world of IT. (not covering anything else like school, etc because then it would be even longer, for that, I forward to this older post)

When I was born, and currently still do, I live with two “families” under one roof. A few years ago, the house was split in two with a wall, but before that I could just walk from one living room to another. I live there with my parents, and on the other side there is my great-uncle with my great-aunt.

Back then, my dad and great-uncle had a computer repair shop together. They would fix computers, install them, help out at people’s homes, etc.
When I was around six years old, I took an interest at it.
At this point my dad switched jobs and it was just my great-uncle doing this. He noticed that it interested me to be around him when he was fixing people’s PCs.
I would always watch and ask why he does what he is doing to learn how he does things. After a few months, he would slowly let me do small things to help him out, like turn off a computer. You know, the basics.
As I got older he would let me do more things, he would show me how to install Windows, how to clean up a computer properly, how to install certain programs, the basics of networking. (what a switch is, what a router does, etc)

I believe when I was around six or seven years old, I got my first laptop. It ran Windows XP, Windows 7 just released and this laptop was quite old, like really old. Old enough that it came with Windows XP when it was released.

Fast forward some more years, I believe I was ten or twelve, and I had my first computer, my dad’s old PC. I started to look at website builders that were free, just to play around with. I would build out websites for fun, that would represent something, I’m no longer sure what.

In 2013, I got started with a game, GTA: San Andreas. I found a multiplayer mod for this, MTA: San Andreas. (MTA standing for Multi Theft Auto instead of Grand Theft Auto). I was playing on a roleplay server at the time, I used my English as best as I could for my age to play on the biggest roleplay server at the time. (Roleplaying in this case, was just real life, but then in a game. So you’d have to make money, you can buy houses, drive vehicles after passing an actual theoretical test, and a practical one where you had to drive to way-points without getting your vehicle damaged or getting pulled over, such things.)
I wanted to start my own, because I found it a lot of fun. MTA: SA uses the LUA language for the “resources” you can put in its server. Using a leaked script as a base (I know, I know.. I was young okay?), I started to explore this and learn LUA, this were my first bits of programming experience next to HTML. I then started to add my own stuff and the gameserver grew, this is also my first experience as a bit of a system administrator, having to maintain my own Windows Server 2008 R2 virtual server I rented and getting DDoS attacks often from jealous people.

A different server became popular in mid-2014, which is when I closed mine down. It was a lot of fun and I learned some Windows System Administration basics, which was very nice. At that point, I realized that IT is definitely the way I want to go to. I really enjoyed maintaining it all and I somehow wanted to continue with this.
I kept the virtual server but used it as a webserver instead, I created my very first website from a template and edited it and ran it from there. Then I discovered ShareX, which can upload screenshots directly to a FTP server, which I had pointed at my virtual server. (Today it points at a S3 bucket that has a CloudFront CDN attached to it.)
Later I also wanted to learn Linux, so I obtained myself VMware Workstation and got my feet wet into the world of VMware and virtualization. Using Workstation to create Linux VMs, starting with CentOS and Ubuntu Server 14.04 (I believe) and later expanding to ESXi and vCenter.

In mid-2017, I bought my very first real server (and it was an old one… and LOUD!). I got myself a HP ProLiant DL140G3. Armed with two 4 core processors (no HT) and 32GB of memory, it was a loud jet engine at 1U. The server was made in 2008, so it’s also not very power efficient, but it was the only thing I could afford at that time. In the beginning of 2018 I got a second one. (I still have both of them, but I no longer use them.)
Both of these ran ESXi and through the internet, I got some licenses that I could use to deploy vCenter. This is when I got really excited and curious for the power of VMware products. I ran some basic workloads on it (ADDS, DNS, File server) on the two servers and that was all for a while.

Meanwhile on my main laptop I was able to run small VMware labs such as with NSX-V, though it’s really slow and small because of the lack of CPU and memory.

At the beginning of 2019, I got some extra money monthly from my parents, and I wanted to rent a more powerful server, because with what I got, saving up for a 1000 euro server would take years. So I went with Hetzner, and got myself one of their servers from the server auction. (I actually still rent this one to this day). Having my own dedicated server (rented), I got more experience with things like networking and remote networks. I deployed a pfSense VM on it with its own dedicated IP, and through an IPsec tunnel, I connected my home LAN with that server’s LAN and also added the ESXi host to my home vCenter.

I then in mid-2019 had saved up enough money through various means (Patreon for example and birthday money) to get my first real server with actual power. a DL380G6. Installed ESXi 6.7 on that (The DL140s only supported ESXi 6.0) and it’s still going strong today as my main host. It did go through an upgrade though at around April 2020, going from 144GB memory to 288GB memory. It has two 2.8 GHz Intel Xeon X5660s. 6 cores/12 threads per CPU.

During this time, I’ve had labs with a lot of products and situations. Such as VMware NSX-V, NSX-T, Cloud Director, HCX, Horizon and vSAN. (That’s what I can think of as of writing this post.) and non-VMware stuff like Palo Alto Network virtual firewalls, GNS3 with Cisco/Nokia gear and more.

This has greatly improved my knowledge on a lot of fields. Virtualization, system management, network management.

A few months before I got the memory upgrade, I rented a second server with Hetzner. A bit more powerful, and I run some more infrastructure VMs on it. Exchange Server 2019, cPanel and an extra web+database server. I also run vRealize Network Insight on that host.

As my income grew and I wanted to earn a little extra, I invested in my own Autonomous System number. In my case AS208751. I rent a /44 IPv6 subnet with it that I announce with a virtual server in Amsterdam, and from there I tunnel it over to my remote and home servers. I started to sell management for virtual servers and eventually also web hosting as well as virtual servers. This allows me to also scale up, I rented a /24 IPv4 subnet which I use partially for the renting stuff, but also for myself, assigning a /28 block to each of my servers. This came with a lot more learning. I suddenly had to learn about BGP and how to do this securely, making sure to have route filters in place and possible add RPKI.

This is all going well, and as of 08/07/2020 (DD/MM/YYYY) I bought a second DL380G6. It has two six core CPUs (Xeon X5660) with 144GB of memory. This extra server will be dedicated to larger labs, like Cloud Foundation and vSphere with Kubernetes.

I’d also like to mention that during my elementary school period, since I was about the age of 10, I was already helping out the fellow classmates with issues on the computers at school and even help out carry basic tasks for the system administrator. When I got in High School (that I did finish, but just barely) on my student account in their Active Directory I had some extra permissions so that I could help out the System Administrators there. I actually also found a type of leak, well, it was a share in Sharepoint that was a bit too wide open. They were happy I catched it before anyone else did and possibly abused it.

On July 17th, I got the amazing news that I’m part of the vExpert program now! Here is the link to me in the vExpert directoy. This is incredible and lots of it is thanks to, and they deserve a special shout-out; Lindy Collier and Heath Johnson.

There are still some solutions that I want to try out further, beyond the Hands on Labs. However, due to limitations like money I cannot do this. Solutions I would be very much interested in getting hands-on experience with, are VMware Cloud on AWS and GCP’s VMware Engine. For the VMware Engine, I did try to request a quota increase, but I got as a reply that “the quota could not be assigned at this time”, which made me a bit sad as I was excited for it that I could use some of my credits on that.

I hope that this long blog post gives you an insight of my past in IT and how I got into it. Feel free to email or tweet me any questions, thank you so much for reading and I hope to see you in a further post.

I’m a vExpert now!

July 17, 2020 | vExpert, VMware | No Comments

Hi everyone,

I applied for the second-half vExpert applications and I got accepted!

This is the first time and I’m really, really happy! This is my fourth attempt and here is to hopefully more years of vExpert.

Here is my public profile page.

If you don’t know what vExpert is, you are missing out on a lot, quoting from the site:
“The VMware vExpert program is VMware’s global evangelism and advocacy program. The program is designed to put VMware’s marketing resources towards your advocacy efforts. Promotion of your articles, exposure at our global events, co-op advertising, traffic analysis, and early access to beta programs and VMware’s roadmap. The awards are for individuals, not companies, and last for one year. Employees of both customers and partners can receive the awards. In the application, we consider various community activities from the previous year as well as the current year’s (only for 2nd half applications) activities in determining who gets awards. We look to see that not only were you active but are still active in the path you chose to apply for.”

Thank you all for reading this short announcement!

See you in the next post!

Hi everyone,

Here is how I upgraded my NSX-T deployment from 3.0.0 to 3.0.1.

If you tried to in-place update a NSX-T Host that has multiple host switches, you will get an error. You can use this trick to get around this limitation.

First, we log into the NSX-T Manager, and go to the Upgrade tab under system. Here, we upload the file and continues with the upgrade.
We upgrade like normal until we get on the hosts tab. We SSH into the host and we first visit this URL: http://:8080/repository/metadata/manifest
This file contains the link to the zip file that we need to wget in /tmp on the ESXi host. Then we run:

esxcli software vib install -d /tmp/filenamehere.zip

Once the installation finishes, we refresh the Hosts tab and then we can continue onto the management nodes, and from there we can continue has normal.

However, once the upgrade finishes, you will need to F5 (sometimes CTRL F5 or CTRL R) the page so the error goes away.

Thank you for reading this quick post and I hope that it was useful to you.

Hi everyone,

In this post, we will be deploying a PyKMIP server that stores its keys in a database. Unlike the docker container, the keys will be saved so on a reboot your keys are not lost.

So what exactly is this for? Well, in my use-case, I will be using this server to encrypted virtual machine files and drives.

For this tutorial, we will be using self-signed certs and this keys will be stored in a sqlite database. This is not secure at all! However, it will allow you to evaluate and learn the KMS functions within vCenter.

What we will need:

  • Ubuntu Server 18.04 or 20.04 LTS installation ISO.
  • One virtual machine to install Ubuntu Server 18.04 or 20.04 LTS on.
  • A network connection to install some packages.

First what we do is we create a virtual machine. This is just how it’s always done. You create a Ubuntu VM and install Ubuntu on it, this should be straightforward.

Now comes the fun part. the green commands should be executed as a user, the red commands as root. Re-place <$username> with your regular account’s username.

sudo -i
apt-get update
apt-get upgrade
mkdir /usr/local/PyKMIP
mkdir /etc/pykmip
mkdir /var/log/pykmip
chown <$username>: -R /usr/local/PyKMIP
chown <$username>: -R /etc/pykmip
chown <$username>: -R /var/log/pykmip
apt -get install python2-dev libffi-dev libssl-dev libsqlite3-dev python2-setuptools python2-requests
openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -keyout /etc/ssl/private/selfsigned.key -out /etc/ssl/certs/selfsigned.crt

Then fill out the form for the SSL certificate. The above certificate will be valid for 10 years. (3650 days)

chown <$username>: -R /etc/ssl/private
chown <$username>: /etc/ssl/certs/selfsigned.crt
exit


cd /usr/local
git clone https://github.com/OpenKMIP/PyKMIP

nano /etc/pykmip/server.conf

Paste the following into the file: (replace x.x.x.x with your VM’s IP)

[server]
database_path=/etc/pykmip/pykmip.database
hostname=x.X.X.X
port=5696
certificate_path=/etc/ssl/certs/selfsigned.crt
key_path=/etc/ssl/private/selfsigned.key
ca_path=/etc/ssl/certs/selfsigned.crt
auth_suite=TLS1.2
policy_path=/usr/local/PyKMIP/examples/
enable_tls_client_auth=False
tls_cipher_suites=
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
logging_level=DEBUG

Almost done! Now we need to edit our crontab to start the service at startup.

crontab -e

Paste the following in on a new line:

@reboot ( sleep 30s; python2 /usr/local/PyKMIP/bin/run_server.py & )

This will make sure that it starts automatically on startup. Reboot your VM or type this in to start it as a background process:

python2 /usr/local/PyKMIP/bin/run_server.py &

Now we need to go to our vCenter. We click on the vCenter and go to configure. Then under Key Providers, we click “Add Standard Key Provider”.

Give it a name under “Name” and “KMS”. Type in the IP address under “Address” and the port number, which by default is 5696 under “Port”. Then click on “Add Key Provider”.

Once you have done that we need establish trust. Click on the Key Provider, then at the bottom click on the KMS server. Click on “Establish Trust” followed by “Make KMS trust vCenter”. Click on “KMS certificate and private key” and then on “Next”.

Now, we need to fill in the KMS certificate and private key. On the VM, run:

cat /etc/ssl/certs/selfsigned.crt

Paste the output (with the dashes!) under KMS certificate.

cat /etc/ssl/private/selfsigned.key

Paste the output (with the dashes!) under “KMS Private Key”.

Now click on “Establish Trust” and we’re done! Now you should be able to use your new KMS server in your lab!

If you want to somewhat tighten security, don’t use the self-signed certificate but use your own certificates and lock down access to the VM, since the database with all your VM keys sits as a file on the filesystem of the VM.

If you have any questions, feel free to contact me through email or Twitter.

Have a great day!

Hilltop CTF – Writeups

June 4, 2020 | CTF, Hilltop CTF, Security | No Comments

Hi everyone,

A blog post on a different topic this time. I was a Content Engineer for the Hilltop CTF event.

Write-up for the Fuzz challenge.

Challenge name: Fuzz

Creator: MasterWayZ

Category: Analysis/Fuzzing


Summary:

The user is given a URL to look at: http://shellserver1.hilltopctf.masterwayz.nl:5876/

How-To:

  1. Using a program like gobuster, we can try to see what directories exist: gobuster dir -u http://shellserver1.hilltopctf.masterwayz.nl:5876/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt.
  2. We get a /301 redirect of /penguins. From here, it’s a matter of running gobuster dir -u http://shellserver1.hilltopctf.masterwayz.nl:5876/penguins/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x txt. The txt extension comes from the .txt file part in the README.md file.

Explanation:

  • We use gobuster to try to see what folder it is hidden in. dir specifies directory mode, -u specifies the URL and -w specifies the wordlist.
  • a 301 redirect of /penguins means that we’ve found something. Now we need to find the file in that directory. The new flag, -x specifies the extension used by gobuster to try to find files.

Write-up for the Fuzzy challenge.

Challenge name: Fuzzy

Creator: MasterWayZ

Category: Analysis/Fuzzing, Attacks/Cracking


Summary:

For this challenge, you need to fuzz a Flask webserver to start with. Followed by brute-forcing a password and then automating or guessing the missing character in the flag.

How-To:

  1. First we try to fuzz a directory. We can use gobuster with this. gobuster dir -u http://shellserver1.hilltopctf.masterwayz.nl:39345/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
  2. We will find that we get a 401 error with /email. Looking at it in the webbrowser, we see that we are given a clue that the username is admin, so we just need to brute-force the password. We can do this with hydra. hydra -l admin -P /usr/share/wordlists/rockyou.txt -s 39354 -f shellserver1.hilltopctf.masterwayz.nl http-get /email. We find the the password is ‘michelle’.
  3. We see the flag, sort of. The ‘!’ in the flag has to be some kind of ASCII character. You can try all of them by hand or automate it. Once you’ve done that, you find that it is 5, making the flag HilltopCTF{FuzzyFuzzyFuzzyFuzzyFuzzy5_08b353dc330dcad5734172ff5009f5e6b3826d49fa7243f3e598effb85bef982}.

Explanation:

  • We first use gobuster to try to find out if there’s a hidden directory. dir specifies directory mode and -w specifies the wordlist.
  • We get a 401 for /email. Which means that it is most likely asking for some kind of authentication. Visiting it with a browser shows that the username is ‘admin’.
  • We use hydra to try to crack the password. -l specifies the login, in this case ‘admin’. -P specifies a password file, in this case rockyou.txt, -s is for the port number and -f specifies the hostname, http-get means that we want to use an HTTP GET request and /email is the path that you want to crack.
  • We get access to a partial flag. the ‘!’ in the flag is not valid. We need to try to see what ASCII or Extended ASCII character we can put in there. You can try this yourself, or automate it.

Write-up for the Injection challenge.

Challenge name: Injection

Creator: MasterWayZ

Category: Attacks/SQL Injection


Summary:

For this you need to perform a SQL injection on a webform in order to dump the database.

How-To:

  1. Go to the website. Look at the site and you will see a form. Proxy this form through something like burp, and save the request made.
  2. Use sqlmap with the request. For example, sqlmap -r injection.req.
  3. After running, it will find some ways to perform a SQL injection. After this, the easiest thing to do is to dump everything with sqlmap. Run: sqlmap -r injection.req --dump.
  4. Piece the flag together. It’s spread across three tables. It’s clear what the start and end is, because of the start of the flag and the } at the end of the flag. The piece with no bracket in it at all is the middle one.

Explanation:

  • We visit the website and only see search related things and a web form. This form submits ID to index.php, which is trying to indicate to the user at some kind of SQL is being performed. We proxy the request through burp and save it to a file. (Proxying through Burp is an easy way to get a request. We need the POST request.)
  • We use sqlmap to test the form for SQL Injection. The -r flag specifies the request and we give it the saved request.
  • When it runs for a while, we specify that we want to do MySQL tests only, as it successfully identified it as a MySQL based SQL server. After a while, it will find multiple vulnerabilities.
  • We use sqlmap again with -r to specify the request file and --dump to dump all contents.
  • From here it’s a case of finding the three flag pieces. It’s easy to see the start and end piece (from the { and }) and there is only one middle piece.

Flag locations:

  • The first part is located in the federal table.
  • The second part is located in the taskforce table.
  • The third part is located in the Guests table.

Write-up for the Backstab challenge.

Challenge name: Backstab

Creator: MasterWayZ

Category: Analysis/Fuzzing, Cryptography/Cracking


Summary:

For this challenge, you had to fuzz the initial webserver to see a passwd file and a secured area. You crack the hash and gain access to the secured area, where you fuzz for the flag.

How-To:

  1. Use a program like gobuster to do the inital scan. gobuster dir -u http://shellserver1.hilltopctf.masterwayz.nl:5843/ -w /usr/share/wordlists/directory-list-2.3-medium.txt
  2. After a while, you will see /secure and /passwd. Download the passwd file and use a program like hashcat with rockyou.txt to crack it: hashcat -m 3700 encrypted.hash /usr/share/wordlists/rockyou.txt.
  3. The password will be found and you can log into /secure with the username and password. The username is given in the challenge description.
  4. Fuzz the /secure/ area and you will find /flag. This contains the flag. We can do that with gobuster dir -u http://shellserver1.hilltopctf.masterwayz.nl:5843/secure/ -w /usr/share/wordlists/directory-list-2.3-medium.txt. (note the /secure/ at the end, especially the last /!)

Explanation:

  • First we run gobuster in directory mode to fuzz some directories and files on the webserver. -u specifies the URL and -w specifies the wordlist.
  • Once we download the hash file, we use hashcat to crack this. -m 3700 is equal to setting mode 3700 which is bcrypt. Finally with -w we specifiy the wordlist, in this case rockyou.
  • Once we have the password, we use that to log into the /secure area.
  • Once in the /secure area, we use gobuster on /secure/ to check for hidden files, and it will find /secure/flag which contains the flag.

Write-up for the Johnny challenge.

Challenge name: Johnny

Creator: MasterWayZ

Category: Cryptography/Cracking


Summary:

For this challenge, the user is given an encrypted .zip file with the flag inside.

The user has to crack the password, which is in rockyou.txt

There are many ways to do this, here is one way:

How-To:

  1. Install john
  2. Download the .zip file
  3. Run zip2john flag.zip > encrypted-zip.john
  4. Run john --format=zip encrypted-zip.john --wordlist=/usr/share/wordlists/rockyou.txt
  5. Once it finishes, run john encrypted-zip.john --show
  6. Use the password, which in this case is ‘patricia’.
  7. Unzip the ZIP file, run unzip flag.zip.

Explanation:

  • What we just did above was use the power of John the Ripper to crack the password.
  • zip2john converts the zip file into a format that john can read.
  • The command after that forces the ZIP format on the encrypted john file and cracks it using the rockyou wordlist.
  • Finally, the --show is used to let john show the password.
  • Then you can extract the file and obtain the flag.

Write-up for the Julius challenge.

Challenge name: Julius

Creator: MasterWayZ

Category: Cryptography/Cracking


Summary:

The best way would be to think of the ROT cipher and then identity to use ROT47 as this is the only one that fits. ROT13 and ROT18 lack some of the characters used.

The rotation is a method of brute-force, in this case it’s 13.

The title of this challenge was chosen to make the user think of the the Caesar chipher and hint towards ROT ciphers. However, it’s also a bit misleading as the user will see that the characters used in the encrypted message cannot exist in a Caesar encoded textfile.


Write-up for the OhSINT challenge.

Challenge name: OhSINT

Creator: MasterWayZ

Category: OSINT/Forensics


Summary:

For this challenge you had to perform some OSINT.

We start with looking at the EXIF data of the jpg file, which leaks a URL to a website. From there, you can to find the pieces of the flag that are spread over the website.

How-To:

  1. Run exiftool image.jpg and look at the comments.
  2. Access the website and look for the clues, you will find them here: one is located on the index page, if you press CTRL and A you will find it, or if you view the source. The second one is located in the view source of the index page as well, but can also be found by clicking the Maps button. The third is one found under the blog button and then view source.

Explanation:

  • We download the file and then run exiftool to look at the EXIF data of the fail, which contains a comment with an URL to visit.
  • We visit the url and are presented with a web page. Here it’s a sign to view sources, use CTRL A and visit every page and click everything to find the three hidden flags.

Flag locations:

  • The first part of the flag is hidden as a near-white text on the index.html page.
  • The second part is under the Blog button at blog.html, view the source and see the flag in an HTML comment.
  • The third part is back on the index.html page, under the Location Maps button.

Write-up for the Fuzzy challenge.

Challenge name: Fuzzy

Creator: MasterWayZ

Category: Steganography


Summary:

The user downloads the image.jpg file, opens it in a text editor, finds the ascii85 flag and decodes it.

How-To:

  1. We download the file using wget.
  2. Running strings image.jpg is one of the ways to get the flag.
  3. Identify that the flag is ascii85 encrypted and decrypt it.

Explanation:

  • wget followed by the URL is used to download a file.
  • cat, or strings (and many more tools) are used to display the contents of a file. In this case, both work as the flag is hidden at the bottom of the image.
  • One of the ways to identify that it is ascii85 is because of the characters used in the encoding. You can use a local tool or online tool to decode it and get the flag.

If you have any questions, please let me know. I’ll be seeing if I can release the files and/or containers somehow.

Have a great day!

Hi everyone,

Time for a new blog post about the adventure I’ve been having for the past two days.

On June 2nd, my server, a DL380G6 started to suddenly take-off. The fans were roaring at 70%, and the temperature sensor near the PCI Riser was showing 110 C. Of course this is not supposed to happen, in this blog post, I will take you through my experience of troubleshooting this and hopefully this can help you.

Okay, so we know that the temperature sensor is showing a very high temperature. Let’s remove the PCI riser and see if the sensor is defective or not. I removed it, and it was showing a normal 60 C. Okay, so there is some PCI card that is getting very hot.

Step two: we put the riser back in. However, since my has two cards in it, I leave one out. I left the Smart Array P420 RAID controller in, and took the quad gigabit NIC out. I turn it back on, and once the sensor initializes, I check it. It was once again showing 110 C. Very odd.

Next I swap the cards around, having the NIC in the bottom slot, and I take out the RAID controller. I once again turn it back on, and now it seems to be fine. Temperature shows 64 C. Well, it seems to be the controller then.

Next step: let’s put the RAID controller back in, and leave its backup capacitor disconnected. I saw that in the IML that the controller says that it is defective. Maybe this causes it. I disconnect the backup capacitor, and now all seems okay. So maybe it was the backup capacitor.

I put the network card back in, start the server once again and all seems well. I boot the ESXi host and let VMs slowly start back up. However, we’re not done yet!

VMware suddenly gives a purple screen of death, as you can see in this screenshot:

I thought it was a one-time thing. (in a production environment, you should not do this! Immediately investigate why the crash occurred!). I restart the server and try agan. This time, it crashes, once again. When I look at the logs through the debugger, I see that nothing really is showing, other than slow response times.

I shut the server back down and take out the controller. The heatsink feels quite warm. I press on it a little bit to make sure that it’s still secured in place, and check the SAS connectors to make sure that they are seated in properly with no dust in them. I turn the server back on, however, now it’s taking off again. Showing 113 C on the sensor.

By accident while taking out the riser card, I touch the heatsink of my RAID controller and burn my hand. So the problem is definitely not fixed yet, and properly the controller crashed because of overheating.

I removed the controller and put the SAS cables in the on-board P410i controller. Temperatures are normal and the server has been running for a bit over a day without crashing.

Ultimately, it looks like my P420 controller has died. I should still have warranty on it from the company I bought it from, so I’m going to try to RMA it. Hopefully that will be possible.

Thank you for reading, if you have any questions feel free to contact me on my website or Twitter and I hope you learned something.

Have a great day

Hi all!

This post will be about the current state (05/20/2020 06/04/2020) of my home lab. Please keep in mind that I also have two ESXi hosts that I rent from a datacenter in Germany that I partially use for my home lab (though they are nowhere near as powerful as my home server).

Here are some pictures:

The black device on the wall is my ISP’s modem. It’s set to bridge mode, meaning it does not do any NAT, DHCP, etc. That routes to my EdgeRouter (which you can see on the edge of the plank in the first picture). This is the main router. It runs DHCP, does NAT, runs a BGP daemon and I have a VLAN on there for NSX-T.

The host you see here, is my HP Proliant DL380G6. It has two Intel Xeon X5660s (6 cores/12 threads at 2.8 GHz), and 288 GB of DDR3 ECC memory at 1333 MHz. I have six drives in it as you can see, they are connected with two SAS cables to an extra RAID card I have in the server, a Smart Array P420. I have two 2TB HDDs in it, a 320GB HDD, two 500GB SSDs and (now, with the update) two 1TB SSDs. Sadly on June 2nd 2020 my P420 controller died, more info here, so right now I use the build-in Smart Array P410i. The colorful cables all go up through the ceiling, into my bedroom’s floor, to a network switch as you can see down here:

Here you can see my Raspberry Pi collection,stacked on my Humax decoder. The black switch at the bottom is my 24 port non-PoE EdgeSwitch 24 Lite. It’s currently full. Stacked on top I have my older TP-Link TL-SG2216. Currently it’s not in use… yet.
Laying on that switch in a UniFi UAP-AC-PRO (more on that later). On the blue box I have a Raspberry Pi 4 Model B 4GB. I use this as a test machine sometimes. On the upper plank I have a Unifi Security Gateway for the WiFi and Guest network.
Next to that is a Unifi 8 port 60W PoE switch. Connected to that is the UAP-AC-PRO you see in the picture, and there’s one downstairs as well. Next to that is a Raspberry Pi 3 Model B I believe, connected to a ADS-B receiver dongle with matching antenna next to the RPi.
There used to a second RPi to the right of it, but it’s on my project table at the moment. That used to be connected with a SDR dongle, and has its antenna on the plank below, on the right side against the wall. That’s my indoor antenna I use to listen in on the airbands (which in The Netherlands is legal at the time of writing).

That’s the current state of my homelab right now. Hopefully it gives you an idea on what I run right now. It’s not done yet… I possibly need to update in a few years as officially, my CPUs don’t support ESXi 7.

I also want to go10 gigabit at some point, but that’s all years away most likely.

Thank you for reading and have a great day!

Hi everyone,

A few days ago, I was surprised with a Twitter DM from the VMUG Advantage Twitter account.

It turns out, that secretly, Heath Johnson from VMware has been in touch with the VMUG Advantage team about me without telling me.

I’m not sure how he managed to pull it off, but VMUG Advantage and me and partnering up! I’ve been given a sponsored 1 year VMUG Advantage subscription, which is amazing! And many, many thanks to Heath for making it happen!

Of course, in return I’ll blog about my adventures with VMUG Advantage. TestDrive is something that I have been exploring lately along with how much easier it’ll be for me to get things set up in my lab using for evaluation licenses.

If you are not sure what you get with VMUG Advantage, or not even sure what it is, let me explain it for you.

VMUG Advantage is a subscription you can get, which gives you discounts amongst other benefits. You get 100$ off of VMworld and you get 20-35% off of training.
Other than that, you also get access to 365-day evaluation licenses. These non-production use licenses are valid for 365 days and are perfect for use in your lab. You also get the downloads, though it may take a bit for the latest version of a product to be on it. This is what is available as of writing this, as of May 4th 2020:

  • Workstation 15 Pro
  • Fusion 11 Pro
  • Cloud Foundation 3.9.1
  • NSX-T 3.0
  • Site Recovery Manager
  • vRealize Suite 2019
  • vRealize Network Insight
  • vSAN 7
  • vSphere 7
  • vCenter 7
  • vSphere 6.x
  • vCenter 6.x
  • vSAN 6.x
  • NSX-V
  • vRealize Orchestrator
  • vRealize Operations for Horizon
  • Horizon Advanced Edition
  • vCloud Suite Standard

I’m not entirely sure of all the versions, but this is what I got.

Not only that (which in my opinion is already amazing), you also get access to VMware TestDrive. With TestDrive you get access to multiple product environments, even some of them as sandboxes. This includes:

Ready to Use Experiences:

  • Workspace ONE
  • Workspace ONE UEM
  • Horizon Cloud
  • Horizon
  • App Volumes
  • Dynamic Environment Manager
  • vSAN
  • PKS
  • velocloud
  • AppDefense

Sandbox Experiences:

  • Workspace ONE UEM
  • Workspace ONE Access
  • Workspace ONE Express

You also get access to the following Sample Integrations:

  • Dropbox
  • Office 365
  • Salesforce

I’m very, very thankful for Health to organize this and I’m very excited to make more blog posts about it. It’s coming soon along with other blog posts about some lab changes.

See you in the next post!