Receive SNMP Traps with Icinga 2 on Ubuntu/Debian

Configure Icinga2 to Receive SNMP Traps on Ubuntu/Debian Warning I’m warning you up front, making this happen is a pain if you’re new to Icinga. I did my best to account for every nuance I ran into, but you may find something else. Feel free to comment if you need help. Introduction Unfortunately, there is no […]

Icinga “ did not exit properly error”

I got this and it took some time to troubleshoot. The error is misleading. What it’s really telling you is that the plugin failed to execute properly. Here’s the catch, this includes warnings. So if you manually test the plugin from the command line outside of Icinga and it works, but gives a warning, when […]

Configuring Icinga for Cisco SNMP

Original Error: “CRITICAL – Plugin timed out while executing system call” I had a bit of trouble getting this to work so I thought I would share my solution. I initially followed the tutorial here. I basically wanted to Icinga to receive SNMP data from a Cisco 7200 I had set up. To begin, set up […]

Stop Ubuntu 14.04 VPN From Dying

The title of my post is a bit misleading, but it’s my solution to the problem. I found that my VPN would randomly die on Ubuntu. I could ping the network internal, but everything external was dead. What I did was add a cron job which checks every minute if the interface is up and […]

What is the Symbol Table and What is the Global Offset Table?

Introduction When I first sought to understand the symbol table and the global offset table (GOT) I found bits and pieces of information, but I had trouble getting the whole picture. As I understood what the symbol table/GOT are, I realized it is easier to describe the symbol table/GOT in the context of the linking and loading […]

Fusion Exploit Challenges Level 01

Some GDB Housekeeping When I first started this challenge, I was quite thrown off. I started debugging with GDB and my level00 exploit worked perfectly as is. In fact, after closer inspection I realized that none of the addresses from level00 were different in level01. I figured this wasn’t a coincidence. After running my exploit […]

Fusion Exploit Challenges Level00 Solution

Introduction Research I began by looking for the port level00 listened on. However, it was not in the source code. I found it by running a netstat -tulpn: From the output you can see level00 listens on port 20000. We could have also found this by setting a breakpoint on SERVE_FOREVER and examining the port […]

Protostar Exploit Challenges Format0 Solution

Introduction Format0 is the introduction to the string exploitation levels. There isn’t much to it except a bit of minutia in the printf function. Exploitation We must complete this level in under 10 bytes of input, which means we can’t do our typical print 1 billion As deal. What we instead do is use the […]

Protostar Exploit Challenges Stack 7 Solution

Introduction This challenge is nearly identical to the last except that you must find a random ret to use and then jump to system. Exploitation Using the same tactics as before I determined the address of my environment variable was at 0xbffffe63. Now we need is a gadget containing a RET. There are fancier, more sophisticated ways […]