Hi, my name is Rolando, I am a Systems Administrator with proven skills in design, configuration, integration and administration of technological platforms with special strength in CyberSecurity as well as script coding for automating tasks, using Bash, Shell, PowerShell, PHP, Python, and others. Specialized in “Like Unix” Operating Systems with strong and extensive knowledge of Windows platforms and virtualization with KVM, Xen, LVM, VMware, I have too demonstrated ability to complete tasks accurately despite interruptions and competing demands. Results-oriented, with more than 20 years in the IT Technology industry.

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Generals | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , , , , | Comments Off on Welcome

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

by: Ravie Lakshmanan from The Hacker News

Researchers reported on Monday that hackers are now exploiting Google’s Analytics service to stealthily pilfer credit card information from infected e-commerce sites.

According to several independent reports from PerimeterXKaspersky, and Sansec, threat actors are now injecting data-stealing code on the compromised websites in combination with tracking code generated by Google Analytics for their own account, letting them exfiltrate payment information entered by users even in conditions where content security policies are enforced for maximum web security.

“Attackers injected malicious code into sites, which collected all the data entered by users and then sent it via Analytics,” Kaspersky said in a report published yesterday. “As a result, the attackers could access the stolen data in their Google Analytics account.”

The cybersecurity firm said it found about two dozen infected websites across Europe and North and South America that specialized in selling digital equipment, cosmetics, food products, and spare parts.

Bypassing Content Security Policy

The attack hinges on the premise that e-commerce websites using Google’s web analytics service for tracking visitors have whitelisted the associated domains in their content security policy (CSP).

CSP is an added security measure that helps detect and mitigate threats stemming from cross-site scripting vulnerabilities and other forms of code injection attacks, including those embraced by various Magecart groups.

The security feature allows webmasters to define a set of domains the web browser should be allowed to interact with for a specific URL, thereby preventing the execution of untrusted code.

“The source of the problem is that the CSP rule system isn’t granular enough,” PerimeterX’s VP of research Amir Shaked said. “Recognizing and stopping the above malicious JavaScript request requires advanced visibility solutions that can detect the access and exfiltration of sensitive user data (in this case, the user’s email address and password).”

To harvest data using this technique, all that is needed is a small piece of JavaScript code that transmits the collected details like credentials and payment information through an event and other parameters that Google Analytics uses to uniquely identify different actions performed on a site.

“Administrators write *.google-analytics.com into the Content-Security-Policy header (used for listing resources from which third-party code can be downloaded), allowing the service to collect data. What’s more, the attack can be implemented without downloading code from external sources,” Kaspersky noted.

To make the attacks more covert, the attackers also ascertain if developer mode — a feature that’s often used to spot network requests and security errors, among other things — is enabled in the visitor’s browser, and proceed only if the result of that check is negative.

A “Novel” Campaign Since March

In a separate report released yesterday, Netherlands-based Sansec, which tracks digital skimming attacks, uncovered a similar campaign since March 17 that delivered the malicious code on several stores using a JavaScript code that’s hosted on Google’s Firebase.

For obfuscation, the actor behind the operation created a temporary iFrame to load an attacker-controlled Google Analytics account. The credit card data entered on payment forms is then encrypted and sent to the analytics console from where it’s recovered using the encryption key earlier used.

Given the widespread use of Google Analytics in these attacks, countermeasures like CSP will not work if attackers take advantage of an already allowed domain to hijack sensitive information.

“A possible solution would come from adaptive URLs, adding the ID as part of the URL or subdomain to allow admins to set CSP rules that restrict data exfiltration to other accounts,” Shaked concluded.

“A more granular future direction for strengthening CSP direction to consider as part of the CSP standard is XHR proxy enforcement. This will essentially create a client-side WAF that can enforce a policy on where specific data field[s] are allowed to be transmitted.”

As a customer, unfortunately, there isn’t much you can do to safeguard yourself from formjacking attacks. Turning on developer mode in browsers can help when making online purchases.

But it’s essential that you watch out for any instances of unauthorized purchases or identity theft.

SOURCE: The Hacker News

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Uncategorized | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> | Comments Off on Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

Ubuntu Desktop Makeover

I must confess that since Ubuntu started, there have been a lot of changes that we have experienced on our desktop (each time for the better). However, I have always loved changing its appearance, to one more according to my particular tastes, sometimes up to 3 changes per year. This is one of the features that I like most about GNU / Linux, the freedom to adapt everything to my liking.

This time, I wanted to make some slight changes in search of elegant minimalism.

This is how I started testing a new icon pack and a tool that works as a widget and that animates my desktop, for this I used Conky.

The end result has been this.

In this sense, I describe in detail the steps taken to reach this result.

Installing Conky on Ubuntu 20.04.

sudo apt update
sudo apt install conky-all conky 

when it finally installed I proceeded to create a hidden file in my home directory called .conkyrc

vi ~/.conkyrc

Then I did insert this content in the file and then save and exit

conky.config = {
--  Generic Settings
        update_interval = 1,
        cpu_avg_samples = 2,
        net_avg_samples = 2,
        out_to_console = false,
        override_utf8_locale = true,
        double_buffer = true,
        no_buffers = true,
        text_buffer_size = 32768,
        imlib_cache_size = 0,
        own_window = true,
        own_window_type = 'normal',
        own_window_argb_visual = true,
        own_window_argb_value = 50,
        own_window_hints = 'undecorated,below,sticky,skip_taskbar,skip_pager',
        border_inner_margin = 5,
        border_outer_margin = 0,
        xinerama_head = 1,
        alignment = 'bottom_right',
        gap_x = 0,
        gap_y = 33,
        draw_shades = false,
        draw_outline = false,
        draw_borders = false,
        draw_graph_borders = false,
        use_xft = true,
        font = 'Ubuntu Mono:size=12',
        xftalpha = 0.8,
        uppercase = false,
        default_color = 'white',
        own_window_colour = '#000000',
        minimum_width = 300, minimum_height = 0,
        alignment = 'top_right',
--  Window Specifications
--  Text Settings
font="Droid Sans:size=10",
--  Color Scheme
color0='FFFFFF', -- clock
color1='FFFFFF', -- date
--  Locale (e.g. "es_ES.UTF-8")
--  Leave empty for default
conky.text = [[
${font Ubuntu:bold One:weight=Light:size=96}${color0}\
${alignc}${time %H:%M:%S}\
${font Poiret One:weight=Light:size=28}${color1}\
${voffset 30}\
${alignc}${execi 300 LANG=${template9} LC_TIME=${template9} date +"%A, %B %d"}\

${font}${voffset -4}
${font sans-serif:bold:size=10}SYSTEM ${hr 2}
${font sans-serif:normal:size=8}$sysname $kernel $alignr $machine
File System: $alignr${fs_type}
Processes: $alignr ${execi 1000 ps aux | wc -l}

${font sans-serif:bold:size=10}CPU ${hr 2}
${font sans-serif:normal:size=8}${execi 1000 grep model /proc/cpuinfo | cut -d : -f2 | tail -1 | sed 's/\s//'}
${font sans-serif:normal:size=8}${cpugraph cpu1}
CPU: ${cpu cpu1}% ${cpubar cpu1}

${font sans-serif:bold:size=10}MEMORY ${hr 2}
${font sans-serif:normal:size=8}RAM $alignc $mem / $memmax $alignr $memperc%
SWAP $alignc ${swap} / ${swapmax} $alignr ${swapperc}%


When done, I did start conky from the console to test it.

To finish, make sure that conky loads automatically when you start my desktop, for this I added it in the list of applications that load the start, for it run the “startup application” and add it like this:

Restart my computer and everything will be working satisfactorily.

Now I had to proceed to change the icons. For this and as usual, I chose https://www.gnome-look.org/s/Gnome/p/1279924 followed the installation instructions.

Once the icons were installed, I changed them from my tweeks app and voila.

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Linux, Technology, Ubuntu | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , , , | Comments Off on Ubuntu Desktop Makeover

#StayHome cooking Sushi

It was more than 7 years ago, when a good Japanese friend, Mr. Tanaka, who very kindly showed me his recipe for preparing Sushi. Unfortunately Tanaka passed away, today I want to share here as a posthumous tribute that recipe that on so many occasions has brought happiness to my family.

There are many times between families and friends we have shared creative sushi tables, accompanied by gatherings and smiles.

Each roll that I have prepared has always been to the taste, creativity and preferences of my diners, but always full of great taste and love when preparing it.

Homemade Sushi

Cooking the Rice

  • 3 cups of rice
  • 3 cups of water + 2 tablespoons of water for every cup of rice.

Then, you must to wash rice until the water is clear.

Cook rice and water in a saucepan: at the first boil, lower the heat to minimum for 12 minutes covered. Then with the kitchen turned off, let it rest for five minutes in the pot.

The rice is cooled in a tray covered with a damp cloth.

Seasoning for Rice

The seasoning for rice has {for each cup of rice} :.

– 2 Tbsp. of rice vinegar.
– 1 tbsp. sugar and ½ tsp. of salt.
– 1 tbsp. of ponzu sauce and another of fish sauce, plus 1 tsp. of sesame oil.

These delicacies are mixed and cooked, but don’t boil !! When everything dissolves, the seasoning is ready and added to the rice when the dressing is cold.

The filling is seen in the gallery {literally fun and delicious gallery}. This is proportional to the creative palette of the cook and his feast guests, so copy and add, with consistency and “Latin American Imagination.”

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> cooking, food, Generals | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , | Comments Off on #StayHome cooking Sushi

Upgrade from Ubuntu 18.04 to 20.04

Hello penguins, I hope this short post helps someone.

As you know, I have been using Ubuntu since 2004, and I must confess that I like it more every day.

I have already some years (5 years at this time) that I left the country where I was born (Venezuela). Now, I live in the United States of America. Place where I have been able to lay roots and start a new life.

In my professional world, I had the opportunity to start and advance many new projects. But always have something is common, it is that in many project, some partners who always look at me strangely, when they see my computer desktop and that does not use Windows.

So they usually ask me, “And what is that?” Obviously, I answer “LINUX, Ubuntu”.

Today, I would like to leave here, the procedure of how I updated my Ubuntu 18.04 to the new version 20.04.

First of all, what I did was make sure that my ubuntu was completely updated, for this I updated my repositories, opening a Terminal and then I ran:

sudo apt upddate

Once the repositories were updated, then proceeded to upgrade the complete system with the command:

sudo apt upgrade

Because I had packages pending upgrade, they were downloaded and updated.

When this was ready, then take advantage of uninstalling everything that was not needed by the system, executing the command:

sudo apt autoremove

I really prefer having the most amount of space on my hard drives before upgrading, so clear the APT system cache by running:

sudo apt clean

At the end of the uninstallation an cleaning process, then restart my computer, I logged in again and reopened my terminal (I use “Deepin Terminal” with FISH). Then I had everything ready to start the installation (Upgrade) to Ubuntu 20.04. So I ran:

sudo do-release-upgrade

This procedure asked me several confirmation questions as well as made it clear that it would take some time to complete.

Please wait patiently (it took about an hour) and when finished my computer rebooted. So when I returned, everything was ready. Everything worked perfectly.

My only recommendation is for those who do not have a fast internet, in which case I would recommend doing such an update from an external medium or a clean installation (If you are going to do a clean installation, remember to back up your data and then be able to restore them)

If you wanna daownload the ISO file to be burned in a DVD or in a USB, try downloading here:

Download Ubuntu 20.04 LTS

Images can be downloaded from a location near you.

You can download ISOs and flashable images from:

https://releases.ubuntu.com/20.04/ (Ubuntu Desktop and Server for AMD64)
http://cdimage.ubuntu.com/ubuntu/releases/20.04/release/ (Less Frequently Downloaded Ubuntu Images)
http://cdimage.ubuntu.com/ubuntu-legacy-server/releases/20.04/release/ (Less Frequently Downloaded Ubuntu Images)
http://cloud-images.ubuntu.com/daily/server/focal/current/ (Ubuntu Cloud Images)
http://cdimage.ubuntu.com/kubuntu/releases/20.04/release/ (Kubuntu)
http://cdimage.ubuntu.com/lubuntu/releases/20.04/release/ (Lubuntu)
http://cdimage.ubuntu.com/ubuntu-budgie/releases/20.04/release/ (Ubuntu Budgie)
http://cdimage.ubuntu.com/ubuntukylin/releases/20.04/release/ (Ubuntu Kylin)
https://ubuntu-mate.org/download/ (Ubuntu MATE)
http://cdimage.ubuntu.com/ubuntustudio/releases/20.04/release/ (Ubuntu Studio)
http://cdimage.ubuntu.com/xubuntu/releases/20.04/release/ (Xubuntu)

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Linux, Technology, Ubuntu | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , , , , , | Leave a comment

Ubuntu 20.04

I have finally been able to update my Ubuntu to version 20.04. As we know, the update from 18.04 through the command ‘do-release-upgrade’ took a while to arrive, however it was only yesterday that I tried it and it worked perfectly.

At first glance I have found that my system is working much, but much better, especially in terms of resource consumption; If it was already optimal before, at this time the statistics of it (I use htop) shows that it is much more optimized.

On the other hand, my system runs on a DELL Inspiron 17 7000-7737 Series. Its operation is total, all the hardware components have been recognized without major problem.

As usual, in this version we will have 5-year support (until April 2025) for both its desktop and server versions.

In addition to having its original flavor, we can count on its additional flavors that you can find HERE.

Finally, all the applications that I had installed, work perfectly.

For now I will stay here, testing and reviewing the new changes and improvements. Soon I will be posting everything new that I find, as well as testing and commenting on its new features.

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Linux, Technology, Ubuntu | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , , , , | Leave a comment

Installing PowerShell on Linux (Ubuntu 18.04)

As all you already must to know, I am a Linux enthusiastic, especially when it comes Ubuntu. But the truth is that in each company in which I had to work for the last five years, they are companies that base their technology platform mostly on Windows Server operating systems.

Because of that, I had to manage Windows servers, but little by little I am including services running on Linux servers, the great advantage all Linux users / administrators know. However, sometimes the integrations require using scripts in PowerShell, that’s why I have installed what is necessary to be able to call PowerShell for WMI queries to Windows servers from my natural BASH, PHP or Python scripts. So then, below, the step by step of how to install the PowerShell console on my Linux operating system (Ubuntu 18.04)

# Download the Microsoft repository GPG keys
wget -q https://packages.microsoft.com/config/ubuntu/18.04/packages-microsoft-prod.deb

# Register the Microsoft repository GPG keys
sudo dpkg -i packages-microsoft-prod.deb

# Update the list of products
sudo apt-get update

# Enable the "universe" repositories
sudo add-apt-repository universe

# Install PowerShell
sudo apt-get install -y powershell

# Start PowerShell
<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Linux, Ubuntu, Windows | <span class="entry-utility-prep entry-utility-prep-tag-links">Tagged</span> , , , , | Comments Off on Installing PowerShell on Linux (Ubuntu 18.04)

Get Installed Agents Windows Server

When I did need to check the Installed Agents in a lot of servers in the network, I decide to try it with an PowerShell Script, this script below do my job easy and quick. This did let me create a file report with each server information that I was looking for.

# Clear Screen
Write-Host Starting Checking proccess..

#Set the PWD to a LocalPath Vab

#Set the name of the file with all Server List to be checked
#Concatenate all the Path and File Name to check
$ListPath=$LocalPath.ToString() + "\" + $FileName.ToString()

#Read  the file  with all servers list and 
$Servers = Get-Content $ListPath

# Loop to check each Server in the list
foreach ($server in $Servers) { 
        Echo "**********************************************************************"
        Echo "Checking host: $Server"  
        Echo "**********************************************************************"
        #Query WMI information from remote system
        $S_error = ""
		Write-Host "Testing connection to $server"
		if (Test-Connection -ComputerName $server -Quiet -count 2){
			 Write-Host "$server is alive and reacheble"
			$Err = Get-WMIObject Win32_BIOS -computername $server -ErrorVariable S_Error -ErrorAction SilentlyContinue
        if ($S_error[0])
	        Write-Host "Having problem connecting to WMI on $Server... "
			Echo "Having problem connecting to WMI on $Server... "
            Echo "**********************************************************************"
            Echo " "

			Write-Host "Getting Information from $Server... "
            $OSInfo = Get-CimInstance win32_OperatingSystem -ComputerName $Server
            $OSInfo | Select-Object -Property @{Name="ComputerName";expression={$_.CSNAME}},@{Name="OS Name";expression={$_.Caption}},@{Name="ServicePack";expression={$_.ServicePackMajorVersion}},@{Name="Architecture";expression={$_.OSArchitecture}},Version,OperatingSystemSKU,@{Name='InstallDate';expression={$_.InstallDate}}
            $Net = Get-WMIObject Win32_NetworkAdapterConfiguration -ComputerName $server -filter ipenabled="true" | Format-List  
            # Echo "CUMPUTER NAME: $Server "
            Echo " NETWORK INFO:" $Net 
            Echo "**********************************************************************"
            $Agents = Get-WmiObject -Query "select * from win32_service where name like'%AmazonSSMAgent%'" -ComputerName $server | Format-Table -Property PSComputerName, Name, ExitCode, Name, ProcessID, StartMode, State, Status
            Echo " AGENTS FOUND at : $Server " $Agents
            Echo "**********************************************************************"
            Echo " " 
            Echo " "
			Echo "**********************************************************************"
            Echo " "

As you can see in the code, you’ll need a file called ServerList.csv in the same folder where you all ready have the past script, please remember that yo must to save the script as “.ps1” file extension.

<span class="entry-utility-prep entry-utility-prep-cat-links">Posted in</span> Windows | Comments Off on Get Installed Agents Windows Server