Skip to content

Instantly share code, notes, and snippets.

View WanggnawJen's full-sized avatar
💭
Study

WanggnawJen WanggnawJen

💭
Study
View GitHub Profile
{
"keys": [
{
"kty": "RSA",
"e": "AQAB",
"kid": "79f944b8-b024-432f-9b28-a0b5cf6a5813",
"n": "xN_KI-fBFZgCbaZ0w0AymUv7yy90FQ7c_6PLVjvELy6ID1kjUCAUgKG_IaflWH5rgTcwoe7iQxXWHuUdbOUZv3qeY_BeFHOG7aKwczJnzlBSEhjCQcQ-XmTvmgSwps1N7E3bWFVIDFX8MwTcV7XyGdNidziabaqtMowjvHvNAZj84_YeI7s2GfgbC-I1ZIueSSPJIIoZkKzPt_XxIGA_NTfHTUeRst3-JFHLTHkt0F6we2ayhcbBFbJ95FwnpBbfn1Gire8Be-edetHK5XIOIxxyPUr2iJunDkWohWocuNRkER7zXzoqQA3pIAGPpFUYHLlitRui5vteUA8QJv4ZTQ"
}
]
Install Packages
=================
yum update
yum install sssd realmd oddjob oddjob-mkhomedir adcli krb5-workstation openldap-clients policycoreutils-python samba*
DNS Resolve
===========
/etc/resolv.conf
search metheus.com
<<< Using On-pre Machine =====> Windows Server 2012 R2 Full patched [192.168.2.132] >>>
Azure migrate appliance ===> Discovery of servers and applications [192.168.4.110]
Azure replication appliance ===> Discovering, Configuration and Process for replication of servers [CS + PS - 192.168.2.133]
[ Only VM/Server discovered by this Replication appliance/server can be replicated/migrated!!! ]
Microsoft Azure Site Recovery Agent ===> Install in each server to get disovered by Replication appliance [Mobility Service agent ASR - 192.168.2.132]
["Microsoft Azure Site Recovery (ASR Unified) Agent" can be taken from "Azure Replication appliance/server" folder ==> "C:\ProgramData\ASR\home\svsystems\pushinstallsvc\repository"]
[Check for available and supported OS version ===> supported version of Agent]
Without Access Control - Local Access Only
=============================================
mongosh
> use graylog [Create new DB named "graylog"]
> db.myCollection.insertOne( { x: 1 } ); [Create new collection named "myCollection"]
> db.graycollection.find() [View data in collection]
> db.createUser({user:"grayloguser",pwd:"useruser22",roles:[{role:"readWrite",db:"graylog"}]})
mongosh mongodb://grayloguser:useruser22@127.0.0.1:27017/graylog
Attacker <===============> Medium_Host <==============> Next_Segment_Host
10.0.2.15 10.0.2.22 | 192.168.2.4 192.168.2.5
port-9999 port-8080 ?????
port-4040 socks
port-1080
Reverse Port Forwarding/Tunnel
------------------------------
R:<local-interface>:<local-port>:<remote-host>:<remote-port>/<protocol>