As Cisco jabber released a new version to fix some security vulnerabilities, I had a opportunity to mass update the existing jabber versions. Below is tested script that I used to successfully deploy the Jabber 12.9.1 version to all Windows endpoints. You can edit this as needed and deploy Jabber 12.9.1. My script basically removed existing Jabber 12.8.1 and 12.6.2 and install latest 12.9.1.
Here are the steps for how to do it in short form,
*** SSH into the switch or console connect.
***show crypto pki certificates —– to get the certificates and show you all the certificates. This will show you all the switch certs and you will be able to locate expired one.
***Locate the ID of the cert that has expired date and it will usually show you something like TP-self-signed-51XXXXXX
***Switch to privilege mode
***no ip http secure-server ——-disable https server before do any renewal
*** no crypto pki trustpoint TP-self-signed-51XXXXX —- this id you were located running first command
***ip http secure-server ———re enables the https server and generates a new trustpoint and certificate
*** do show crypto pki certificates – check the new cert is there with new validity period
But after straight forward upgrade and testing everything was fine except SCCM, reporting will not load and was throwing an error Failed to load expressions host assembly. But SQL server was working without an any error.
****Basically, copy srsresources.dll from old SSRS install location which was in my case was in \Program Files\Microsoft SQL Server\MSRS11.MSSQLSERVER\Reporting Services\Report Server\Bin
TO
New SSRS location \Program Files\Microsoft SQL Server\MSRS13.MSSQLSERVER\Reporting Services\Report Server\Bin
****Then find rssrvpolicy.config file in new SSRS install (\Program Files\Microsoft SQL Server\MSRS13.MSSQLSERVER\Reporting Services\Report Server\Bin) open with note pad
****Then search for the SRSResources URL within note pad and change the URL to new location where DLL copied in first step.
Recently, I had to renew one of the remote desktop server farm SSL certificate. There are many instructions and videos for renewal of self-sign SSL for RDS gateway but there are only few places I was able to find anything for trusted SSL renewal.
In this blog I’ve used images from windowsserveressentials.com ( https://windowsserveressentials.com/2012/06/20/renew-your-ssl-certificate-sbs-2011-essentials/), because I really didn’t have chance to take snapshot of every step I did and cannot risk leaking any info on servers I worked on( if I forget to black out some parts π ). But basically cert renewal is the same and no difference initially with few important changes. Server I worked was 2016 Server.
****First, open IIS Manger and click on Server name.
****Then click on server certificate about to expire and right hand top corner click on create certificate request and this will bring up certificate request wizard. In this fields make sure to fill the name as exactly as current rds gateway name and choose bit length as 2048.
****Then save the cert request where ever you want. But I usually save to the root C:\Cert\2020. So I can keep track on old certs too. Just in case if I need old one I’ve it close by. This a text file with all the crypto info.
Then head to your favourite SSL provider and complete the cert renewal. My cert provider was Go daddy and usually godaddy auto renew SSL but cannot use this SSL due to the fact that it is missing private key info from the server. So basically click on cert and copy and past entire certreq.txt file info and request the SSL from Go daddy.
****Then Go daddy will do it things and send out email to whoever mange domain to confirm cert renew. In this case I had access to the email account who mange the domain. Once you go daddy issue cert go ahead and choose IIS as a cert and download to the server cer location. I choose C:\certs\2020.
****Then we gonna go to next step and open IIS Manger again and same place click on complete cert renewal. Then select the CA issues cer and name the cert complete the request which will install new SSL on IIS.
****After cert install SSL need to bind into port 443 in order to be active.
****So we are done with SSL for IIS, then need to assign cert for RD Gateway. Open TS Gateway Manager and right-click the local TS Gateway server, and then click Properties.
****On the SSL Certificate tab, click Select an import and it will show certificate just install in IIS and you can simply install it. After that Click OK to close the Properties dialog box for the TS Gateway server.
I’m sure anyone of you log onto server notice that server manger start automatically. This is particularly issue for remote desktop environment when regular user log in, they will be presented with server manger. I’ve no idea why Microsoft allow this in RDS environment in first place. Anyways, here how you can disable it for all users.
There is two way you can do this first via GP, which is my preferred method.
First bring up group policy editor and create a GP and navigate to Computer configuration, Administrative Templates, System, Server Manger and then open ” Do Not Display Server Manger Automatically at logon” and click enable.
Otherwise, ( But this will need to be run on each servers) run power shell in admin mode,
Get-ScheduledTask -TaskName Server Manger | Disable-ScheduledTask -verbose
This is very useful if you have system that you need to run commend without keep typing su in the beginning of the command line and then enter the sudo password.
Bring up terminal and ssh into the system ssh your host ip -l username and then enter the psw
You will be in the ssh line on the remote system.
Type sudo visudo and then the psw
add this line to the end of the file and save and done.
I love to experiment with various software and one of those essential system that I play around is kali. I’ve setup mine in ESXI server that I cannot directly connect. This is one of the way you can RDP into your kali and experience full GUI access.
Here is the codes that you need to run in sudo mode.
I know once in a while we all have to use our CMD skill to set some stuff up in machines. So here is some command to get windows machine online via CMD.
****First you need to locate the name of the network interface
netsh interface ipv4 show interfaces
***Assume that you want to setup a static IP such as below
IP:172.28.5.10
sub:255.255.255.0
GW: 172.28.5.1
netsh interface ip set address name=”Local Area Connection” static 172.28.5.10 255.255.255.0 172.28.5.11
Note that ” local area connection” is the one I found when I ran very first command and “1” in the end is the metric for route.
If you want to forget about the static rout and want to get DHCP,
netsh interface ip set address name=”Local Area Connection” dhcp
****Now if you want to set a static DNS,
netsh interface ip set dns name=”Local Area Connection” static 8.8.8.8
Second DNS
netsh interface ip add dns name=”Local Area Connection” 8.8.4.4 index=2
Again if you want to get DNS via DHCP
netsh interface ip set dnsservers name=”Local Area Connection” source=dhcp
DONE,your PC will be one line!!. Yes of course you need to plug the network cable π
Computer communication via internet only can work if TCP/IP working properly. I’m sure you have seen after many ipconfig/renew/release and flushdns and REBOOT still PC cannot get IP. In my experience this is related to corruption in TCP/IP and of course you need to check the cable or WIFI is connected before all of this π
Anyway here is how to reset those corrupted TCP/IP stack and make sure to reboot the PC after reset and RUN the command prompt in ADMIN mode.Also if you have static IP, remember to note them down, because this will wipe those out!
Before all of this in my experience resetting socket also can fix many ip stack related issues and here is the command.
If you are familiar with PENTEST and Kali linux platform, you should know nmap which is great vulnerability scanning tool. But recent version of kali has dropped ZENMAP which is GUI base for nmap which great tool to run nmap in GUI and also to generate command line to run on nmap.
Few of my blog readers mentioned to me that after Kali 2020.4 my previous method of installing Zenmap no longer works. So after breaking few VM images and few swear moment I was able to figure out a way to install Zenmap GUI in new Kali. π
Then bring up terminal from the place downloaded the tar package and run sudo su and get the root access. After that run below command in sequence. Very good guide here https://nmap.org/book/inst-source.html
apt-get updatebzip2 -cd nmap-7.91.tar.bz2 | tar xvf -
cd nmap-7.91
./configure
make
su root
make install
then install each package with dpkg -i <each package name from above>
As a example dpkg -i ./python-cairo_1.16.2-2ubuntu2_amd64.deb
Once you down you will be able to see zenmap from search window in kali. But if you want to run Zenmap as root you need to brows into place where tar package got unzip. In my case download folder nmap 7.91 and bring terminal and run sudo su and then ./zenmap.
apt-get update apt-get install alien cd to the download folder where you download zenmap sudo alien “zenmap-7.80-1.noarch.rpm” sudo dpkg -i “zenmap-7.80-1.noarch.deb”