opkg install kmod-veth
opkg install kmod-ipt-extra
opkg install iptables-mod-extra- Install a new container (I created an arch linux container)
- Open up the /srv/lxc/containername/config file for editing:
| <!doctype html> | |
| <html> | |
| <head> | |
| <meta name="viewport" content="width=device-width" /> | |
| <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | |
| <title>Simple Transactional Email</title> | |
| <style> | |
| /* ------------------------------------- | |
| GLOBAL RESETS | |
| ------------------------------------- */ |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log| KEYMAPOPTS="us us" | |
| HOSTNAMEOPTS="-n alpine" | |
| INTERFACESOPTS="auto lo | |
| iface lo inet loopback | |
| auto eth0 | |
| iface eth0 inet dhcp | |
| hostname alpine | |
| " | |
| TIMEZONEOPTS="-z UTC" |
| #!/bin/bash | |
| sed -i -e 's/Anarchy/Arch/g' /etc/lsb-release | |
| sed -i -e 's/Anarchy/Arch/g' /etc/os-release | |
| sed -i -e 's/anarchy/arch/g' /etc/os-release | |
| sed -i -e 's/arch-linux/www.archlinux/g' /etc/os-release | |
| echo 'SUPPORT_URL="https://bbs.archlinux.org/"' >> /etc/os-release | |
| echo 'BUG_REPORT_URL="https://bugs.archlinux.org/"' >> /etc/os-release | |
| cp /etc/os-release /usr/lib/os-release | |
| head -n -2 /etc/lightdm/lightdm-gtk-greeter.conf > lightdm-gtk-greeter.conf | |
| mv lightdm-gtk-greeter.conf /etc/lightdm/ |
| //////// | |
| // The vm module lets you run a string containing javascript code 'in | |
| // a sandbox', where you specify a context of global variables that | |
| // exist for the duration of its execution. This works more or less | |
| // well, and if you're in control of the code that's running, and you | |
| // have a reasonable protocol in mind// for how it expects a certain | |
| // context to exist and interacts with it --- like, maybe a plug-in | |
| // API for a program, with some endpoints defined for it that do | |
| // useful domain-specific things --- your life can go smoothly. |
| # ======================================================== | |
| # Setup a Dumb AP, Wired backbone for OpenWRT / LEDE | |
| # ======================================================== | |
| # Set lan logical interface as bridge (to allow bridge multiple physical interfaces) | |
| uci set network.lan.type='bridge' | |
| # assign WAN physical interface to LAN (will be available as an additional LAN port now) | |
| uci set network.lan.ifname="$(uci get network.lan.ifname) $(uci get network.wan.ifname)" | |
| uci del network.wan.ifname | |
| # Remove wan logical interface, since we will not need it. | |
| uci del network.wan |
| # Client Bridged / Client Mode / RelayD and IGMPProxy (It works) | |
| # RelayD is to redirect packages and IGMP is for redirect IGMP packages | |
| # Our network is 192.168.1.0/24 | |
| # Steps: | |
| # Configure WAN as static | |
| # We should edit our wan iface and put static IP | |
| uci set network.wan='interface' | |
| uci set network.wan.proto='static' | |
| uci set network.wan.ipaddr='192.168.1.239' # Main Network IP |
| # ==================================================================================== | |
| # Steps for Main Router (must have connected internet on WAN port) | |
| # ==================================================================================== | |
| # Set your network IP address configuration default is 192.168.1.0/24 | |
| uci set network.lan.ipaddr='192.168.1.1' | |
| # Recommended, to identify on network and when logged on | |
| uci set system.@system[0].hostname='MainRouter' | |
| uci set network.lan.hostname="`uci get system.@system[0].hostname`" |