Posts - Page 2 of 4
Docker cleanup commands
It is important that from time to time, machines running Docker are cleaned because otherwise, Docker leftovers will start piling up and eating precious storage space.
Push notifications for Linux logins
An easy walkthrough on enabling instant push notifications for logins and logouts on a Linux system with Pushover. You will need a Pushover account. Pushover is a proprietary service for smartphones, with a single-time purchase application which includes a generous free quota (never ever surpassed the “free” limits for any of my personal projects, and I receive sometimes more than 20 notifications per day). Register for a free account here.
Automating Proxmox with Ansible
Ansible is an automation platform for managing machines. When combined with Proxmox, it becomes a ridiculously powerful tool to orchestrate virtual datacenters.
Unknowndevice64 writeup
Increasing post frequency
TL;DR: I will try to stick to a bi-weekly post schedule. 1 post every 14 days.
bWAPP writeup
Kuya 1 writeup
This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.
Typhoon v1.02 writeup
This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four different flags to capture.
The five phases of ethical hacking
An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out against computer systems to spot vulnerabilities and weaknesses.
Post-Exploitation: spawning a shell
Once you have gained shell access on a machine, you will often find the prompt extremely limited, especially if you have used manual exploitation. In these cases, the shell often cannot perform basic tasks that you would expect from a fully interactive shell prompt like Bash, or zsh. You will also be unable to run intensive interactive commands such as the Vim text editor, or ncurses-based programs.