Hostapd with TP-Link TN822N

Hostapd with TN822N (RTL8192cu chipset)

Do the following (from the github/pvaret link):

sudo apt-get install linux-headers-generic build-essential dkms
git clone
sudo dkms add ./rtl8192cu-fixes
sudo depmod -a
sudo cp ./rtl8192cu-fixes/blacklist-native-rtl8192.conf /etc/modprobe.d/

then fix / replace the hostapd binary:
1. Download this -> (the file is called
2. Make sure you are running the latest kernel.
3. Unzip that new zip file you download
Go to: RTL8188C_8192C_USB_linux_v4.0.2_9000.20130911/wpa_supplicant_hostapd
4. unpack the hostapd tarball:
tar -zxvf wpa_supplicant_hostapd-0.8_rtw_r7475.20130812.tar.gz
Go to this folder: wpa_supplicant_hostapd-0.8_rtw_r7475.20130812/hostapd
5. Run: make -j5
Install it: cp hostapd /usr/sbin/hostapd_realtek
modify /etc/init.d/hostapd:

# Define interface
# Select driver
#wlan1 realtek
#wlan0 asus/atheros
#wlan0 asus/atheros
# Set access point name
# Set access point harware mode to 802.11g
# Set WIFI channel (can be easily changed)
# Enable WPA2 only (1 for WPA, 2 for WPA2, 3 for WPA + WPA2)
wpa_pairwise=TKIP CCMP


Linux AD authentication with transitive trusts…

My big accomplishment for the day was getting Linux authentication working through an Active Directory one-way transitive trust with winbind and kerberos…
Yeah, nobody at work had any idea what I was talking about either. They just heard my maniacal laugh as I ran out of the building…

Interesting Article on Cloud Migrations

Python SSL Analyzer

Good Article on Docker and Windows

Browser Test Page for Poodle Vulnerability


Reference for configuring xorg-edgers ppa for NVIDIA drivers on Ubuntu

Possible fix for Chrome/Pepperflash/Shockwave crashes on Linux

Found at

## download stable to /tmp/chrome
mkdir -p /tmp/chrome
cd /tmp/chrome

## split out the archive
ar vx google-chrome-stable_37.0.2062.94-1_amd64.deb

## extract data
tar --lzma -xvf data.tar.lzma

## copy & manifest.json to /opt/chrome
cp opt/google/chrome/PepperFlash/* /opt/google/chrome/PepperFlash/

# open chrome and test...

You may want to keep a copy of & manifest.json  around to replace upgraded versions with until this is fixed. Be sure that you enable click-to-play to help prevent malicious flash programs.

DHCP Client Proof of Concept Bash Exploit

I had heard talk about how the Bash vulnerability might affect DHCP clients.  I guess this is what they meant:


XWindows on EC2

Launch Xming server on local desktop (Windows)
Turn on X11 forwarding in putty.
(I did not have to set any local DISPLAY environment variables)

sudo yum install xorg-x11-xauth.x86_64 xorg-x11-server-utils.x86_64 xterm

I think I logged out and then ssh’d back in at this point (with X11 forwarding on).

Then I just did an “xterm”. That should open a new terminal window. From that you should be able to run commands that need to open new windows without having to set additional environment variables. The window took a bit to open. If it doesn’t pop up, look at your task bar to make sure it didn’t start minimized. I think that may be an Xming thing…

For a really slow browsing experience (or to run an installer that needs a web browser):

sudo yum install firefox

Then run firefox from the xterm….