Category: Technology

vSphere 6.0 Documentation Center

Source: vSphere 6.0 Documentation Center   ESXi Log File Locations ESXi records host activity in log files, using a syslog facility. Component Location Purpose VMkernel /var/log/vmkernel.log Records activities related to virtual machines andESXi. VMkernel warnings /var/log/vmkwarning.log Records activities related to virtual machines. VMkernel summary /var/log/vmksummary.log Used to determine uptime and availability statistics for ESXi (comma separated). ESXi host agent log… Read more →

Working with ESX Log files

Source: Good article written by Simon Greaves. I grabbed things I really liked and pasted below: See his article for original content and some extra stuff. Working with ESX(i) log files is important when troubleshooting issues within the virtual environment. You can view and search log files in ESX(i) and in vCenter Server using a few different methods. Methods Using… Read more →

Excel and the F key

OK, so the title is click bait. But seriously the F key in Excel on a laptop with no number pad is something to be shared.  Excel decided that the F keys, you know F1, F2, F3… and the function key on keyboards that have dual purpose F keys, that the F key functionality should be switched. This means if… Read more →

Network scanning

This post will be focused mainly on tools and techniques that allow you to look at a network and see IP 4 characteristics like TCP open ports, responsive nodes on the network, OS searching. Some of the tools in the post will be things like nMap, Zenmap, Wireshark.   Nmap Nmap can be found here (Linux) or (Windoows)   Command… Read more →

Reaver Basics

Reaver can be ran on linux and does a linux based brute for hack (attempt) on an AP.   If you have windows you can:  Download kali image, download vmware player personal use version If you have linux you can: install aircrack, reaver and you are good to go   References   Steps 1. Install Reaver (Google… Read more →