martes, 6 de enero de 2026

VMware vCenter Server 7.0.3.00600 - ERROR "NO HEALTHY UPSTREAM"

Some days ago, when we wanted to login administration page of VMware VCenter, it shows us this message: "NO HEALTHY UPSTREAM".

This problem happens because the power went off in our CPD. To solve this problem, I found this useful information:

Then of check this site, and follow the instrucctions , it doesn't works. So I look up in google information to solve this. Then of chek a lot of information this is the recipe that I used to solve:

1. It's Important know what means "NO HEALTHY UPSTREAM"

The "not healthy upstream" error in vCenter is not related to the services listed as Healthy on port 5480, nor to "optional" services. It is a critical issue with vCenter's core services,this message is generated by vCenter's internal proxy (Envoy / reverse proxy) when it cannot communicate with essential backend services.

2. This Services SHOULD BE STARTED (CRITIC SERVICES)

Although  the Appliance Management (5480) works, the principal IU  (443) depends of this services, and if they are stopped, the proxy doesn't have valid “upstream”.

    LIST OF CRITIC SERVICES:

    Check speciallity this and in this order:
    1. VMware Lookup Service
    2. VMware Secure Token Service
    3. VMware Certificate Authority Service
    4. VMware Certificate Management Service
    5. VMware vCenter Server
    6. VMware vCenter-Services
    7. VMware vSphere Client
    8. VMware Service Lifecycle Manager API
    9. VMware vStats Service

    3. Check Time and Date - NTP


    Form the Appliance Management (5480) , check if the server has the correct time and date, and if ntp is active.

    4. Using SSH conection - Restart services

    Connect to SSH cli as a rooy user and then tun this commands:

    service-control --stop --all

    Wait for 5 to 10 minutes and the run

    service-control --start --all

    Then of that try again to go load page of the principal IU  (443).

    Greatings.

    miércoles, 2 de enero de 2019

    Burpuite

    https://hack-ed.net/2016/01/09/burp-suite-for-beginners/

    https://hack-ed.net/2016/04/02/advanced-burp-suite/

    miércoles, 5 de diciembre de 2018

    martes, 4 de diciembre de 2018

    martes, 13 de junio de 2017

    CentOS 6.8 + Webmin + Squid + AD user's authentication with Microsoft Server 2008


    CentOS 6.8:

    Processor: 1
    Ram:1536mb
    HD :20Gb

    Tip: Don´t set up vmware to create automatically, use the manual proccess.

    In some cases is optional dependences's install
     – perl – perl-Net-SSLeay – openssl – perl-IO-Tty

    Then of installation update this:

    yum install perl
    yum install perl-Net-SSLeay

     o

    apt-get install perl libnet-ssleay-perl openssl libauthen-pam-perl libpam-runtime libio-pty-perl apt-show-versions python
     
    Webmin:
    Check las update of, until now, Webmin 1.840 then:

    wget http://prdownloads.sourceforge.net/webadmin/webmin-1.840-1.noarch.rpm
    o

    wget http://prdownloads.sourceforge.net/webadmin/webmin_1.840_all.deb

    then install:

    rpm -i webmin-1.760-1.noarch.rpm

    dpkg --install webmin_1.840_all.deb

    Configuration:
    Existen casos, en el que tengamos bloqueado por defecto el port 10000 en el firewall, pero para ello basta con tan solo agregar la regla al firewall
    Se puede hacer por linea de comandó o editando el archivo de iptables.
    En la primera opción ejecutamos el comandó:

    1
    iptables -I INPUT -p tcp -m tcp --dport 10000 -j ACCEPT
    y en la segunda agregamos la regla en el archivo : /etc/sysconfig/iptables

    1
    -A INPUT -p tcp -m tcp --dport 10000 -j ACCEPT
    después de configurar la regla del iptables, reiniciamos el servicio

    1
    /etc/init.d/iptables restart
    Ahora solo queda acceder al webmin, con las credenciales de ”root” del servidor.
      sarg
    https://ohem.wordpress.com/2009/07/16/instalacion-y-configuracion-en-sarg/ 
    http://configurar-proxy.blogspot.com/2014/05/sarg-herramienta-de-reportes.html
    http://www.linuxmail.info/squid-analysis-report-generator-webmin/






    lunes, 15 de mayo de 2017

    smb-vuln-ms17-010.nse - WannCry

    cd /usr/share/nmap/scripts 
     
     
    wget https://raw.githubusercontent.com/cldrn/nmap-nse-scripts/master/
    scripts/smb-vuln-ms17-010.nse 
     
    nmap --script smb-vuln-ms17-010 -p135,445 IP.IP.IP.IP