Type this command inside git repository:
$ git config core.filemode false
Security Researcher, DevOps, SRE
Type this command inside git repository:
$ git config core.filemode false
Redshift is a tool to reduce the brightness and make your display more redness to protect your eyes when you working for too long. Install redshift on ubuntu :
$ sudo apt-get install redshift redshift-gtk
afterwards, open up redshift (Alt+F2) : redshift-gtk
$ ssh -f -N -v -t -L 5433:target_host:5432 user@jump_server
Test the forwarded port using telnet:
$ telnet localhost 5433
or using netcat:
$ nc -vz localhost 5433
Install parted:
sudo apt-get install parted
Use parted to create partition:
parted /dev/sdb
Inside parted cli, follow these steps:
(parted) mklabel gpt Warning: The existing disk label on /dev/sdb will be destroyed and all data on this disk will be lost. Do you want to continue? Yes/No? yes (parted) unit GB (parted) mkpart primary 0.0GB 3000GB (parted) print
Format the filesystem we created, using mkfs and try to mount it to mount point:
mkfs.ext4 /dev/sdb1 mkdir /tes mount /dev/sdb1 /tes
Add your mount point and swap permanently, so they will automatically mounted when you reboot.
$ sudo vim /etc/fstab /swapfile swap swap sw 0 0 /dev/sdb1 /test1 ext3 defaults 0 0 /dev/sdb2 /test2 ext3 defaults 0 0 /dev/sdb3 /test3 ext3 defaults 0 0
This is a quick guide will show you how to open ssh tunnel to ssh into your target server that can only be accessed from jump server. So this is how to do it:
ssh -v -t -L 10443:localhost:20443 <jump_server> ssh -t -L 20443:localhost:443 user@<target_server>
So, here is the example:
ssh -v -t -L 10443:localhost:20443 123.456.1.1 ssh -t -L 20443:localhost:443 user@10.1.1.1
And try it out, see the magic for yourself! after the last command above executed, you will inside your target_server and 10443 port is open from your localhost.
target_server~$
If you want to just have your SSH session running in background and you want to SSH it by yourself, just try this command:
ssh -f -N -v -t -L 10443:localhost:20443 123.456.1.1 ssh -t -L 20443:localhost:443 user@10.1.1.1
if you want to remove the logs (disable verbose mode) when you logging in, just remove the “-v”
SSH to localhost with port 10443, to access your target_server
$ ssh localhost 10443
Magic!
If your VPN client office using forticlient, you might want to run your VPN client with only command line, so you don’t have to see the small window just for connect your servers from home. With this bash script you can run your forclient VPN client only with CLI.
Install expect first if you’re using ubuntu.
$ sudo apt-get install expect
Then copy this script below and save it. Inside the script there are some variables like username, password, host, port, that you need to fill.
#!/bin/bash # Forticlient SSL VPN Client launching script utilizing expect. FORTICLIENT_PATH="/your-path-to-forticlient/64bit/forticlientsslvpn_cli" # VPN Credentials VPN_HOST="yourVPNHost:YourPort" VPN_USER="yourVPNUser" VPN_PASS="enter-your-pass-here" if [[ $EUID -ne 0 ]]; then echo "This script must be run as root" exit 1 fi if [ -z "$FORTICLIENT_PATH" ]; then FORTICLIENT_PATH=`uname -r | grep -q 64 && echo $(locate forticlientsslvpn_cli | grep 64bit) || echo $(locate forticlientsslvpn_cli | grep 32bit)` if [ ! -f $FORTICLIENT_PATH ]; then echo "Tried to locate Forticlient SSL VPN Cli binary, but failed." echo "Specify it at variable FORTCLIENT_PATH" exit 1 fi echo "Located Forticlient VPN Client at: $FORTICLIENT_PATH" fi echo "Killing previous instances of Forticlient SSL VPN client..." killall -9 $(basename $FORTICLIENT_PATH) 2> /dev/null cat << EOF > /tmp/expect #!/usr/bin/expect -f match_max 1000000 set timeout -1 spawn $FORTICLIENT_PATH --server $VPN_HOST --vpnuser $VPN_USER --keepalive expect "Password for VPN:" send -- "$VPN_PASS" send -- "\r" expect "Would you like to connect to this server? (Y/N)" send -- "Y" send -- "\r" expect "Clean up..." close EOF chmod 500 /tmp/expect /usr/bin/expect -f /tmp/expect rm -f /tmp/expect
After you saved the script, let’s try to run it with sudo mode:
$ sudo vpn.sh &