How to install and manage VMWare Workstation Pro virtual machines?

If we want a cool personal lab environment, then we have to use cool tools and technology. Virtual machines are one of the best inventions for learning and practicing IT in isolated environments. We can simulate and test Operating System changes, kernel modifications and even network configurations from our chair on our PC or notebook. Let’s build a basic test lab!

Continue reading “How to install and manage VMWare Workstation Pro virtual machines?”

How to install VMWare Workstation Pro on Windows 10?

VMWare is a famous name in virtualization technology. If you work in IT it is impossible that you don’t know about the VMWare products. A lot of companies use the vSphere infrastructure with vCenters and ESXi hosts. On the other end of their products there are the home users and small businesses. We can use the Workstation Player for free for non-commercial use of course, but the Workstation Pro has more powerful features that can help us building a personal home lab.

Continue reading “How to install VMWare Workstation Pro on Windows 10?”

Conditional statements – making decisions in Ansible code

In a playbook or in a role sometimes we want to run different tasks based on different conditions. In most cases it depends on a fact (detail about the managed host) or some data collected during the playbook run. Ansible conditionals are there to make it possible to run different tasks based on different conditions, or skip executing tasks entirely.

Continue reading “Conditional statements – making decisions in Ansible code”

Loops in the Ansible code – the basics of iteration

Ansible loops and conditional statements are very cool inventions, but they are a double edged sword as well. The limitless freedom they give us can turn our roles into horrible mess. It is our responsibility to balance on the edge and use just the right amount of them in our code while we keep in mind that YAML is not a programming language.

Continue reading “Loops in the Ansible code – the basics of iteration”

Creating an Ansible role from a playbook: modular, reusable code

After we ran ad-hoc commands and created a monolith playbook, we will increase our level of automation. We will separate our code much better with introducing modular, reusable file structures called roles. Ansible roles will load variables, handlers and tasks automatically for us based on a defined directory and file structure.

Continue reading “Creating an Ansible role from a playbook: modular, reusable code”

Getting started with Ansible for managing our personal lab – ad-hoc commands

After we installed Ansible and tested that it works well, then we want to make it work for us. There are three methods Ansible can operate. The first one is running so called ad-hoc commands with the ansible command line tool. The second option is to write re-usable code (playbooks, roles and variables) and run them with the ansible-playbook command. Both commands use the push mechanism to interact with the controlled nodes. A third option is a tool called ansible-pull that (as its name suggests) pulls the configuration onto a managed machine from a source code management repo. Let’s take a look at the easiest method, the ad-hoc commands first!

Continue reading “Getting started with Ansible for managing our personal lab – ad-hoc commands”

Windows as Ansible control host in WSL2

We all want to work smarter, not harder. (Or at least some of us…) Automating the repetitive tasks was always a huge leap forward even before the “DevOps times” when we wrote shell scripts and Perl code to create automation out of the box. Today we have the luxury of choosing between a lot of automation and orchestration frameworks.

Continue reading “Windows as Ansible control host in WSL2”

How to brute force a web application password with Burp Suite? Basic dictionary attack in practice!

With Burp Suite we can initiate dictionary attacks against a website. This time in this simulated attack we will brute force the login field of the Juice Shop web application. We already know the email address of an admin user, so we have to make sure to find the right password.

Important note: hacking in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to brute force a web application password with Burp Suite? Basic dictionary attack in practice!”

How to brute force FTP users and passwords with Hydra? Ethical Hacking in real life!

In this article we will investigate other functionalities of the Cyber Security test tool Hydra. In one of the previous articles we cracked a user password on a Linux system through SSH. In this example we do not know the exact username of any FTP user. We will create a list of possible usernames along our password list. All of these operations happen in a personal lab.

Important note: hacking in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to brute force FTP users and passwords with Hydra? Ethical Hacking in real life!”

How to backup VMWare Workstation Player machines?

The Workstation Player of VMWare is a lightweight and free desktop virtualization hypervisor for non-commercial users. We can learn about virtualization and use it for practicing for free. We can run Windows, Linux and BSD systems on our host machine. The Workstation Player supports Windows and Linux as host for virtualization.

The free solution comes with some limitations. The following technique will let us to take backups or snapshots of our virtual machines. Only use it for personal practice and learning! Business and nonprofit use is considered commercial use!

Continue reading “How to backup VMWare Workstation Player machines?”