At first i thought that’s normal and typescript won’t affect microservice development cause i don’t have much experience in typescript and loopback framework but on the other hand i found that the company implement Microservice architecture the wrong way.Read More
From one month ago, my ISP implemented a mechanism to throttle any encrypted traffic on TCP or UDP and that upgrade affected my ShadowSocks Proxy which i use to tunnel my VPN and escape censorship.
ShadowSocks & VPN speed became very slow and connection became unstable.
After some investigation for alternative, i have found Cloak.
Cloak is an encrypted proxy utilize HTTPS as Transport Layer.
Cloak consist of two software packages
- Cloak Proxy: Responsible for HTTPS transmission and mainly uses Plain encryption (No Encryption)
- ShadowSocks Proxy: Responsible for encryption and tunneled throw Cloak proxy.
After implementing Cloak in my internal network as global proxy for the firewall (OPNSense), i have been able to bypass the ISP throttling because HTTPS throttling is very hard task for the ISP.
In this article i will explain how to setup Cloak in your network.
For more understanding about OPNSense & ShadowSocks review this article [OPNSENSE + NORDVPN + SHADOWSOCKS (ULTIMATE SECURITY)]Read More
From 6 years ago, I heard about technique of hiding data in images & videos called Steganography, it differs from Encryption because Encryption obfuscate visible information but Steganography make it invisible by nature.
Hiding the information in another files like images or videos makes the Steganography a powerful tools for leaking information without detection.
I needed such tool in point of time, so I searched the internet for Steganography tools and I found very good resources & projects on GitHub, but I wanted to learn the art of Steganography and how to build such tools for myself, plus I had some ideas to improve and make a simple tool for such application.
So I decided to build my own Steganography tool which hide information in images and I called it “SecuPad++”Read More
Currently my main job is Microsoft Dynamics Technical Consultant which responsible for developing and customizing features in Microsoft Dynamics 365.
I was facing an issue in accessing my own work which i exported from the environments i’m developing on.
Microsoft let you export your project in format called *.axpp which help you take backup of your project for archiving or relocation.
This feature is awesome but the problem was what if i want to access the content of the exported file and extract some of my old codebase in the current projects.
For that i was re-importing the project in test environment so i could open the files in Visual Studio and extract the content i want, UNTIL ………Read More
I have a low specs proxy server in the cloud with 1 CPU, 1GB Ram which act as a connector between my firewall/router and VPN provider.
This proxy server was getting cyber attacks from unknown sources and the proxy server relay this traffic to my firewall as normal traffic.
My home firewall has a special software called IPS Suricata which receive these attacks and thinks that the proxy is the machine which perform the attacks and block it and that action makes my VPN restart on the firewall and disturb my internet connection.
This behaviour happens frequently, so i decided to install Suricata on my proxy server to defend itself and prevent such traffic to arrive to my home firewall.
After installing Suricata on my proxy server i faced a CPU utilization problem. Suricata at first will perform fine and the CPU utilization will be low, then after awhile for unknown reasons the CPU goes to 99% and that will cause speed downgrade on my home firewall cause i’m tunneled throw that proxy server.
After two days troubleshooting, i decided to write a monitor script to act on my behalf, if the Suricata CPU goes beyond certain threshold the script will kill the process and restart the service immediately.
After deploying that script and run it as daemon, the problem is solved and the internet became stable at my home and the attacks disappeared.Read More
After using OPNSense firwall for a while to tunnel my traffic throw VPN directly from the network infrastructure level, i’m really satisficed with the experience but while i’m monitoring the firewall traffic, i discovered a traffic leaking happen in some cases.
VPN traffic should go to the VPN Interface, but i find a traffic on the WAN Interface which originated from the LAN to VPN and the firewall pass it and that cause leak.
To prevent such leaking i configured the firewall rules to drop any VPN traffic that escapes to the WAN Interface by tagging the VPN traffic in the network and on the WAN i will check the traffic tag, if the traffic is VPN traffic the firewall will drop it to prevent the leak.
In this article i will explain the configuration to prevent such leak on OPNSense.Read More
After while of using OPNSense firewall, i needed to resize my disk on ESXi and scale up the disk space for OPNSense.
After investigating this issue online, i found that i need to resize the disk from command line and i could not find one clear source to help me on this task.
The problem for me was the swap partition, cause the new free space appended on the end of the disk and i can’t used it because the swap partition is on my way. To scale up root partition the free space should be continuous and available after the target partition.
I had two options
- Remove the swap partition (Not recommended)
- Move the swap partition to the end of the disk (Recommended)
In this article i will describe how to move the swap partition to the end of the disk and scale up root partition for OPNSense.
The steps don’t require shut downing the firewall or use live usb, it’s straight forward steps while the firewall is operational, but be caution and alert to what you are doing.Read More