Lukej2680 Tech Blog

CDP and LLDP

This lab demonstrates how to configure Cisco Discovery Protocol (CDP) on Cisco router and switch devices. It will also discuss Link Layer Discovery Protocol (LLDP) and the differences between CDP and LLDP.

EtherChannel Configuration

This lab walks through the processes of configuring layer2 and layer3 EtherChannels.

Solr

In the last week zero day log4j has blown up affecting thousands of software. In this post I discuss this vulnerability and using the TryHackMe Solr, created by the TryHackMe team and John Hammond, walk through exploiting and partailly patching log4j.

Blocky

Blocky demonstrates the dangers of leaving unsecured files and the reuse of credentials. While there were multiple paths to root on this box the ease of which it was rooted was compounded by the simple reuse of credentials.

Optimum

Optimum was running a vulnerable file sharing server that was exloited using a remote code execution script. Once on the host system was gained by using the kernel exploit MS16-098.