León Castillejos’ blog

“There are no small problems. Problems that appear small are large problems that are not understood.” - Santiago Ramón y Cajal

Posts - Page 2 of 4

Damn Vulnerable Web Application v1.10 Virtual Machine

  • 1 min read

The latest binary release for Damn Vulnerable Web Application is an ISO of the 1.0.7 version. It was released almost ten years ago in 2010. And the way to install a newer version is quite a lengthy process, so I decided to release this virtual machine with everything already set up.

Read More

Docker cleanup commands

  • 2 min read

It is important that from time to time, machines running Docker are cleaned because otherwise, Docker leftovers will start piling up and eating precious storage space.

Read More

Push notifications for Linux logins

  • 4 min read

An easy walkthrough on enabling instant push notifications for logins and logouts on a Linux system with Pushover. You will need a Pushover account. Pushover is a proprietary service for smartphones, with a single-time purchase application which includes a generous free quota (never ever surpassed the “free” limits for any of my personal projects, and I receive sometimes more than 20 notifications per day). Register for a free account here.

Read More

Automating Proxmox with Ansible

  • 4 min read

Ansible is an automation platform for managing machines. When combined with Proxmox, it becomes a ridiculously powerful tool to orchestrate virtual datacenters.

Read More

Unknowndevice64 writeup

  • 4 min read

This is a short and fun machine available on VulnHub. The machine has no outdated, vulnerable software, but is set up as a fun CTF challenge with a few intentional configuration mistakes you’re supposed to exploit to get a root shell.

Read More

bWAPP writeup

  • 5 min read

bWAPP is a PHP application specifically designed to be exploited. It contains many bugs and vulnerabilities, and allows you to select the security level, similar to the well known Damn Vulnerable Web Application. You can download it here.

Read More

Kuya 1 writeup

  • 8 min read

This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.

Read More

The five phases of ethical hacking

  • 1 min read

An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out against computer systems to spot vulnerabilities and weaknesses.

Read More