Open up “Network and Internet” settings in Control Panel.
Find your WiFi adapter, right click and select properties.

Click on Sharing, then click the box under Internet Connection Sharing. Select the Ethernet connection and save.

Open up “Network and Internet” settings in Control Panel.
Find your WiFi adapter, right click and select properties.
Click on Sharing, then click the box under Internet Connection Sharing. Select the Ethernet connection and save.
There are a few different ways to find out the system up time in Linux.
admin@localhost [~]# cat /proc/uptime 306350.37 2218975.63 admin@localhost [~]#
Taking the above command one step further, we can run it in the date command to see the system start up date.
date --date="cat /proc/uptime | awk '{print $1}'seconds ago"
[admin@localhost ~]$ uptime 6:25AM up 2 days, 6:24, 3 users, load averages: 0.00, 0.00, 0.00 [admin@localhost ~]$
[admin@localhost ~]$ w 6:27AM up 2 days, 6:25, 2 users, load averages: 0.00, 0.00, 0.00 USER TTY FROM LOGIN@ IDLE WHAT admin p1 localhost. 6:09AM 13 su (bash) admin p2 localhost. 6:25AM - w [admin@localhost ~]$
Reference links
https://sharadchhetri.com/2013/03/18/4-different-commands-to-find-system-uptime-in-linux/
Edit IPF config
vi /etc/ipf.rules
Hit “i” to enter insert mode and add the following to allow SSH from the 192.168.0.0/24 ip range. Change range if needed.
pass in quick on bge0 proto tcp from 192.168.0.0/24 to any port = 22 flags S keep state
Save and exit the file by hitting “Esc” then typing “:wq” followed by enter.
And start IPF with new rules
ipf -Fa -f /etc/ipf.rules
2023 Update: Recent versions of REHL have completely disabled DES which can cause issues even when using the +ssh-rsa or +ssh-rsa. You can use the following command to enable SHA1, however, upgrading the server would be recommended.
update-crypto-policies --set DEFAULT:SHA1
Reason for it not working is some of the older weaker SSH encryption algorithms have been disabled. You can allow ssh to use it by specifying the following option.
-oHostKeyAlgorithms=+ssh-dss
The whole command would look like
ssh -o HostKeyAlgorithms=+ssh-dss root@192.168.111.4
Check and verify that DNS is not being blocked upstream by a firewall. Behavior is weird, the server can get out to the internet, access to the servers IP address is available, but can’t ping domains that are locally hosted. Are also unable to ping the domains from the internet in.
To resolve the issue either disable the DNS firewall rules, or better yet add some rules to allow access to the cPanel server.
Find active screens with
xrandr | grep " connected"
Example output
HDMI-0 connected 1920x1080+0+0 (normal left inverted right x axis y axis) 527mm x 296mm
eDP-1-1 connected primary 1920x1080+0+0 (normal left inverted right x axis y axis) 294mm x 165mm
Set desired screen brightness. Range is from 0-1
xrandr --output eDP-1-1 --brightness .5
Problem – Need 2.4 Ghz network enabled and SSID set to WiFi. Wireless router is behind a NAT, using UNMS to ssh into the radio, and from the radio ssh into hAP. Enter/Return key not working to run commands, so running the commands over ssh from the radio.
WA.v8.4.2# ssh admin@192.168.88.2 'interface wireless print' admin@192.168.88.2's password: Flags: X - disabled, R - running 0 name="wlan1" mtu=1500 l2mtu=1600 mac-address=74:4D:28:0F:69:B3 arp=enabled interface-type=Atheros AR9300 mode=station ssid="MikroTik" frequency=2412 band=2ghz-b/g channel-width=20mhz secondary-channel="" scan-list=default wireless-protocol=any vlan-mode=no-tag vlan-id=1 wds-mode=disabled wds-default-bridge=none wds-ignore-ssid=no bridge-mode=enabled default-authentication=yes default-forwarding=yes default-ap-tx-limit=0 default-client-tx-limit=0 hide-ssid=no security-profile=default compression=no 1 R name="wlan2" mtu=1500 l2mtu=1600 mac-address=74:4D:28:0F:69:B2 arp=enabled interface-type=Atheros AR9888 mode=ap-bridge ssid="WiFi" frequency=5180 band=5ghz-n/ac channel-width=20mhz secondary-channel="" scan-list=default wireless-protocol=802.11 vlan-mode=no-tag vlan-id=1 wds-mode=disabled wds-default-bridge=none wds-ignore-ssid=no bridge-mode=enabled default-authentication=yes default-forwarding=yes default-ap-tx-limit=0 default-client-tx-limit=0 hide-ssid=no security-profile=default compression=no WA.v8.4.2# ssh admin@192.168.88.2 'interface wireless set disabled=no ssid=WiFi wlan1' admin@192.168.88.2's password: WA.v8.4.2# ssh admin@192.168.88.2 'interface wireless print' admin@192.168.88.2's password: Flags: X - disabled, R - running 0 name="wlan1" mtu=1500 l2mtu=1600 mac-address=74:4D:28:0F:69:B3 arp=enabled interface-type=Atheros AR9300 mode=station ssid="WiFi" frequency=2412 band=2ghz-b/g channel-width=20mhz secondary-channel="" scan-list=default wireless-protocol=any vlan-mode=no-tag vlan-id=1 wds-mode=disabled wds-default-bridge=none wds-ignore-ssid=no bridge-mode=enabled default-authentication=yes default-forwarding=yes default-ap-tx-limit=0 default-client-tx-limit=0 hide-ssid=no security-profile=default compression=no 1 R name="wlan2" mtu=1500 l2mtu=1600 mac-address=74:4D:28:0F:69:B2 arp=enabled interface-type=Atheros AR9888 mode=ap-bridge ssid="WiFi" frequency=5180 band=5ghz-n/ac channel-width=20mhz secondary-channel="" scan-list=default wireless-protocol=802.11 vlan-mode=no-tag vlan-id=1 wds-mode=disabled wds-default-bridge=none wds-ignore-ssid=no bridge-mode=enabled default-authentication=yes default-forwarding=yes default-ap-tx-limit=0 default-client-tx-limit=0 hide-ssid=no security-profile=default compression=no WA.v8.4.2# ssh admin@192.168.88.2 'interface wireless registration-table print' admin@192.168.88.2's password: # INTERFACE RADIO-NAME MAC-ADDRESS AP SIGNAL... TX-RATE 0 wlan2 A7:32:54:EE:E4:35 no -77dBm... 18Mbps 1 wlan2 34:7A:F4:43:AD:81 no -69dBm... 6Mbps WA.v8.4.2# exit
You can print a random number between 1-10 with the following command.
echo $((( RANDOM % 10 )+1))
If you change it so the output is between 0-9 you get decently even results.
cat /dev/null > random.txt && cat /dev/null > random2.txt && for ((i=0; i<=9999;i++)); do echo $((( RANDOM % 10 ))) >> random.txt ; done && for ((i=0; i<=9;i++)); do echo $(grep -c $i random.txt) $i; done | sort -n
Note that you can change the command to be between 1-10, but all the 1’s in 10 will get grepped and counted as 1’s.
The above command should return something similar to the following. Sorted by lowest occurrences first.
943 5 945 8 985 7 996 2 997 6 1005 3 1012 9 1016 4 1033 0 1068 1 admin@localhost:~$
We can plot them in LibreOffice Calc.
Gnuplot is another utility that you can use to plot numbers. Example is below.
cat /dev/null > random.txt && cat /dev/null > random2.txt && for ((i=0; i<=9999;i++)); do echo $((( RANDOM % 10 ))) >> random.txt ; done && for ((i=0; i<=9;i++)); do echo $i $(grep -c $i random.txt) ; done | sort -n | gnuplot -p -e 'plot "/dev/stdin"'
apt install hashcat
bob@localhost:~/$ dmesg ... [ 1057.776074] sd 0:0:0:0: [sda] Write Protect is off [ 1057.776074] sd 0:0:0:0: [sda] Mode Sense: 43 00 00 00 [ 1057.776593] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 1057.780234] sda: sda1 [ 1057.783346] sd 0:0:0:0: [sda] Attached SCSI removable disk bob@localhost:~/$
From the above we see that the drive we just pluGged into the system is “sda” so our path and partition is “/dev/sda1”
The following command will run hashcat against “/dev/sda1”, change if the encrypted partition is different. Mode is to brute force every 8 numeric character combination. Refer to the following link to learn more about mask attacks.
https://hashcat.net/wiki/doku.php?id=mask_attack
Note: You should be able to dump the header and work off of that as well.
sudo hashcat -a 3 -m 14600 /dev/sda1 ?d?d?d?d?d?d?d?d
Find the thumb drive with lsblk, dmesg, or sudo fdisk -l. In the following examples we are using /dev/sdc1, replace as needed.
sudo cryptsetup --verbose --verify-passphrase luksFormat /dev/sdc1 sudo cryptsetup luksOpen /dev/sdc1 encrypted_usb sudo mkfs.ext4 /dev/mapper/encrypted_usb
Now we can mount the drive. We are mounting it to /mnt change if needed.
sudo mount /dev/mapper/encrypted_usb /mnt
Or go ahead and close the channel and remove the drive
sudo cryptsetup luksClose /dev/mapper/encrypted_usb
sudo cryptsetup --verbose --verify-passphrase luksFormat /dev/sdc1
Wipe /dev/sdc1 and set the password when prompted for it.
sudo cryptsetup luksOpen /dev/sdc1 encrypted_usb
Open up a secure channel to the drive, and decrypt it so we can access it
sudo mkfs.ext4 /dev/mapper/encrypted_usb
Using the channel we created in the previous command, we can now format the drive.
sudo cryptsetup luksClose /dev/mapper/encrypted_usb
We can now close the channel for the drive and remove it.