1

Tips & Tricks : Session log files in SecureCRT

-

I use SecureCRT quite often to access Linux systems as well as network devices.

When going through one of the presentations on SecureCRT web page I found handy tip how to configure session logs to have it divided by date, time and session.

Screenshot below demonstrates settings for log file:

SecureCRT Log File configuration

Basically parameters are set to:

  • Log file name: %Y-%M-%D–%h-%m-%s.%t__%S(%H).txt
  • Options / Start log upon connect: checked
  • Custom log data / On each line: %h:%m:%s(%t):

These settings will create separate log file for each session every time connection will be established.

In addition to that each line will start with timestamp added by SecureCRT.

0

How-To : Use Raspberry PI as Wireless Access Point

-

Here is how to turn Raspberry PI with Linksys WUSB100 v2.0 adapter and Raspbian into wireless access point. This might be handy for conference rooms where you have wired connection, but wireless signal is too low. Just quick setup on Raspberry, plugin the cable and you have wireless available.

Install required packages

apt-get install firmware-ralink wireless-tools hostapd bridge-utils

Modify /etc/network/interfaces to add bridge interface

auto lo br0

iface lo inet loopback
iface eth0 inet manual

allow-hotplug wlan0
iface wlan0 inet manual

iface br0 inet dhcp
bridge_ports eth0 wlan0

Once network configuration is modified reboot Raspberry PI.

Create /etc/hostapd/hostapd.conf file to define access point configuration

interface=wlan0
driver=nl80211
bridge=br0
country_code=PL
ieee80211d=1
ssid=raspb3rry-wifi
hw_mode=g
channel=6
wme_enabled=0
macaddr_acl=0
auth_algs=1
wpa=2
wpa_passphrase=raspberry123
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP

Add configuration information to /etc/default/hostapd

That will make hostapd daemon to start automatically each time Raspberry PI will bootup.

DAEMON_CONF="/etc/hostapd/hostapd.conf"
0

Code snippets : Passing credentials to Get-WmiObject in PowerShell

-

If there is a need to pass specific credentials to Get-WmiObject in order to gather information from remote machine, here is how you can do it:

$LAdmin = "DOMAIN\Administrator"
$LPassword = ConvertTo-SecureString "Password!" -AsPlainText -Force
$Credentials = New-Object -Typename System.Management.Automation.PSCredential -ArgumentList $LAdmin, $LPassword

Once $Credentials object is created you can easily use it to gather information from remote PC:

Get-WmiObject -ComputerName $computername -Class Win32_VideoController -Namespace "root\cimv2" -Credential $Credentials
0

How-To : Automate application mapping using SCCM 2012 Powershell

-

During mass reainstallation/redeployment/migration of large number of PCs, always question about applications is raised.

How to deploy/deliver applications once all machines are resintalled?

If you have SCCM in the infrastructure, this might help a lot with automation. All you need is mapping between computer name and applications (to be more specific collection ids) and PowerShell console on SCCM server.

Then you just need to prepare input files for the script below and you can automate application deployment on mass scale.

(more…)

0

Apps : Cisco7PCF for Windows

-

Just released small app for Windows platform. This app allows to decrypt type 7 password from Cisco devices as well as passwords from Cisco VPN profiles (PCF files).

Password which can be recovered using this app:

  • wireless keys fro Cisco access points,
  • RADIUS/TACACS shared secrets
  • NTP authentication keys
  • Enable passwords (NOT enable secrets, which are stored using MD5)
  • enc_GroupPwd – VPN group password from PCF file
  • enc_UserPassword – VPN user password from PCF file

Application also allows to store password and/or send tchem via email after decryption.

You can find app in Windows Store:

Cisco Password Decryptor

Page 10 of 33« First...89101112...2030...Last »