Posts - Page 2 of 4
Damn Vulnerable Web Application v1.10 Virtual Machine
The latest binary release for Damn Vulnerable Web Application is an ISO of the 1.0.7 version. It was released almost ten years ago in 2010. And the way to install a newer version is quite a lengthy process, so I decided to release this virtual machine with everything already set up.
Docker cleanup commands
It is important that from time to time, machines running Docker are cleaned because otherwise, Docker leftovers will start piling up and eating precious storage space.
Push notifications for Linux logins
An easy walkthrough on enabling instant push notifications for logins and logouts on a Linux system with Pushover. You will need a Pushover account. Pushover is a proprietary service for smartphones, with a single-time purchase application which includes a generous free quota (never ever surpassed the “free” limits for any of my personal projects, and I receive sometimes more than 20 notifications per day). Register for a free account here.
Automating Proxmox with Ansible
Ansible is an automation platform for managing machines. When combined with Proxmox, it becomes a ridiculously powerful tool to orchestrate virtual datacenters.
Unknowndevice64 writeup
Increasing post frequency
TL;DR: I will try to stick to a bi-weekly post schedule. 1 post every 14 days.
bWAPP writeup
Kuya 1 writeup
This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.
Typhoon v1.02 writeup
This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four different flags to capture.
The five phases of ethical hacking
An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out against computer systems to spot vulnerabilities and weaknesses.