LSM, SELinux, Netlabel, and CIPSO

LSM, SELinux, Netlabel, and CIPSO If you are new to CIPSO and SELinux, their relationship is confusing to say the least. I wanted to shed some light for those just setting out on the topic as to how the four of these things work together. LSM Original paper describing LSM: Linux Security Module Framework. Within the context […]

Setting Up SELinux (A quickstart)

What This Tutorial Covers A quick start for installing SELinux A quick start for configuring Multi-Level Security (MLS) Configuring Users and Files for MLS A listing of helpful SELinux commands The aim of this tutorial is to get the user up and running with SELinux quickly and provide additional resources for further research. Tutorial performed on: […]

Connect GNS3 to ESXi

Introduction As far as I can tell, there’s no great way to make this happen. I will explain, but to give you an image up front, below is a diagram of what I did. It may seem daunting at first, but I’ll explain as we go along. Set Up Description My GNS3 server is running on […]

Receive SNMP Traps with Icinga 2 on Ubuntu/Debian

Configure Icinga2 to Receive SNMP Traps on Ubuntu/Debian Warning I’m warning you up front, making this happen is a pain if you’re new to Icinga. I did my best to account for every nuance I ran into, but you may find something else. Feel free to comment if you need help. Introduction Unfortunately, there is no […]

Configuring Icinga for Cisco SNMP

Original Error: “CRITICAL – Plugin timed out while executing system call” I had a bit of trouble getting this to work so I thought I would share my solution. I initially followed the tutorial here. I basically wanted to Icinga to receive SNMP data from a Cisco 7200 I had set up. To begin, set up […]

What is the Symbol Table and What is the Global Offset Table?

Introduction When I first sought to understand the symbol table and the global offset table (GOT) I found bits and pieces of information, but I had trouble getting the whole picture. As I understood what the symbol table/GOT are, I realized it is easier to describe the symbol table/GOT in the context of the linking and loading […]

Fusion Exploit Challenges Level 01

Some GDB Housekeeping When I first started this challenge, I was quite thrown off. I started debugging with GDB and my level00 exploit worked perfectly as is. In fact, after closer inspection I realized that none of the addresses from level00 were different in level01. I figured this wasn’t a coincidence. After running my exploit […]

Protostar Exploit Challenges Format0 Solution

Introduction Format0 is the introduction to the string exploitation levels. There isn’t much to it except a bit of minutia in the printf function. Exploitation We must complete this level in under 10 bytes of input, which means we can’t do our typical print 1 billion As deal. What we instead do is use the […]