-
I often review various vulnerability scanners. When I review them, I look at several different things: were they able to find a vulnerability I previously missed? are they accurate in their findings? how quickly do they complete an audit compared to “insert some other vulnerability scanner here”? sometimes I will also grab the tcpdumps of […]
-
I work from home a lot. My ISP used to never change IP addresses dynamically the first 3 years or so I was with them. Now they change it often (more than once a week). This creates a slower response time when I am at home, get a page, go to log in via ssh, […]
-
Openx has been a pain in my ass for some time now (5 years). Even if you have the latest most up to date software release, you will still get append and prepend infections. I’m not sure if it comes from client browsers when they log in or some other reason. What I can assure […]
-
This is a really simple fix which will block the user enumeration on a wordpress site (like the method by wpscan). Before I get into this, I am very well aware of the IfIsEvil page on nginx wiki. But it also says on this page, “The only 100% safe things which may be done inside […]
-
If you get these errors….. [codesyntax lang=”bash”] insserv: warning: script ‘S85vpnagentd_init’ missing LSB tags and overrides insserv: warning: script ‘vpnagentd_init’ missing LSB tags and overrides insserv: There is a loop between service rmnologin and mountnfs if started insserv: loop involving service mountnfs at depth 7 insserv: loop involving service networking at depth 6 insserv: There […]
-
I just bought this card to replace an older radeon 4500 series gpu. Here are the benchmarks (this is a quad-core amd with 16GB memory, sata drives): Pyrit [codesyntax lang=”bash”] $ sudo pyrit benchmark Pyrit 0.4.1-dev (svn r308) (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Running […]
-
This is a trick I learned a long time ago. I used to teach it in my linux administration, digital forensics, and ethical hacking courses I taught at college. It has been one of the most useful commands I ever learned. So the scenario goes like this: lets assume you have a user you suspect […]
-
I finally got around to upgrading my desktop from Backtrack 5R3 to the latest Kali Linux. After about two weeks, I finally set out to get the ati graphics card working so I could do some password cracking. This turned into fun as the version of fglrx-drivers don’t support my 4500 series graphics card. The […]
-
Mostly doing this article as a note for the correct way to install java jdk or runtime for kali or debian wheezy. Download either the jdk or jre tar.gz package from oracle Install the java-package from debian [codesyntax lang=”bash”] apt-get install java-package [/codesyntax]
-
There are times when I need to do things and I don’t trust using public access, hotspots, etc. So basically what I did was set up a vpn on my home network and I can then connect to it from anywhere. This has the advantage of encrypting my communications while in a public place. One […]