Skip to content

vanderziel.org

about IT security, random events of interest and other specifics :)

  • Home
  • Linux
    • Security
    • nginx
    • docker
  • Vulnerability Management
    • Vulnerability Assessment
    • Vulnerability Scanning
  • Challenges and CTFs
    • Challenges and CTFs
    • Hackthebox
  • About Me

configuration

players picture from pexels.com
Challenges and CTFs HacktheBox 

Hackthebox – Player

November 8, 2019July 12, 2020 Anko 0 Comments configuration, CTF, ffmpeg, hackthebox, include, ssh

As with any machine, we start with a port scan root@kalivm:~/Player# nmap -sTV -p 1-65535 -oN fullscan_tcp 10.10.10.145 Starting Nmap

Read more
linux Technical 

Raspberry Pi and a Chinese 7″ display

October 5, 2017 Anko configuration, raspberry pi

Some while ago, I stumbled across a nice 7″ display ordered at aliexpress at one of my friends. Since I

Read more
linux Security Technical 

KVM Virtualisation and a pfSense firewall

September 28, 2017 Anko configuration, firewall, linux, networking, security, server

Recently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes

Read more
linux Technical 

Autofs and samba shares

March 5, 2017March 5, 2017 Anko autofs, configuration, samba, server

Since we still have one windows computer at home (my wife’s laptop), my file server runs samba. Some days, I

Read more
linux Security Technical 

Password protection for LUKS encrypted laptop

December 4, 2016October 1, 2019 Anko 0 Comments configuration, GRUB, LUKS, password, security

Halfway past November, a vulnerability in the LUKS Full-disk encryption for linux systems was discovered (CVE-2016-4484). Since I use this

Read more
Information security linux Security Technical Wordpress 

Insecure on purpose – building a CTF-target

December 2, 2016December 2, 2016 Anko 0 Comments configuration, CTF, insecure, password, security, server, ssh, vulnerability scan, wordpress

Last month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.

Read more
home automation linux Technical 

Home automation – putting it all together

April 28, 2015May 16, 2015 Anko 0 Comments configuration, home, home automation, raspberry pi

After getting all elements delivered at home, the next step in realizing the home automation part is putting it all

Read more
home automation linux Technical 

Home automation – first steps

April 27, 2015May 16, 2015 Anko 0 Comments configuration, home, home automation, raspberry pi

I’ve been thinking about home-automation for a long time, maybe some 5 to 10 years already. Not having to get

Read more
linux Security Technical 

Fail2Ban – installation & configuration

February 2, 2014 Anko 0 Comments configuration, security, server, ssh

Fail2Ban is a very useful tool to limit brute-force attacks on your web- or ssh-server (and other servers, but since

Read more
linux nginx Security Technical Wordpress 

Configuring nginx for hosting this wordpress site

December 10, 2013 Anko 0 Comments configuration, https, nginx, security, self-signed certificate, server, ssl

So after buying a domain and finding a purpose for having that domain I had to reconfigure my web server.

Read more

Recent Posts

  • Vulnerability scanning – Defining a scanning approach
  • Protected: Root-me.org – Command & Control Level 5
  • Protected: Root-me.org – Command & Control Level 4
  • Protected: Root-me.org – Command & Control Level 3
  • Protected: Root-me.org – Command & Control Level 2
planning picture from pexels.com
Information security Security Technical Vulnerability Assessment Vulnerability Management Vulnerability Scanning 

Vulnerability scanning – Defining a scanning approach

March 26, 2021 Anko 0
picture of 'cracked' ground from pexels.com
Challenges and CTFs root-me.org 

Protected: Root-me.org – Command & Control Level 5

September 26, 2020 Anko
photo of a relay station from pexels.com
Challenges and CTFs root-me.org 

Protected: Root-me.org – Command & Control Level 4

September 25, 2020September 26, 2020 Anko
Explorer picture from pexels.com
Challenges and CTFs root-me.org 

Protected: Root-me.org – Command & Control Level 3

September 25, 2020September 25, 2020 Anko
keyboard picture from pexels.com
Challenges and CTFs root-me.org 

Protected: Root-me.org – Command & Control Level 2

September 25, 2020 Anko
'payloader' photo from pexels.com
Challenges and CTFs root-me.org 

Protected: Root-me.org – ICMP Payload

September 13, 2020 Anko
containers photo from pexels.com
Challenges and CTFs HacktheBox 

Hackthebox – Tabby

June 21, 2020January 16, 2021 Anko 0
print-photo from pixabay.com
Challenges and CTFs HacktheBox 

Hackthebox – Fuse

June 20, 2020January 16, 2021 Anko 0

Categories

Tag Cloud

challenge configuration crypto CTF forensics git hackthebox home home automation htb https ISO27001 linux memory analysis networking nginx OSWE password PowerShell python raspberry pi reverse engineering RFI root-me.org scratchpad security server SMB sqli sql injection ssh ssl surveillance Underthewire volatility vulnerability scan web webshell Windows WinRM wireshark wordpress work xss xxd
Copyright © 2022 vanderziel.org. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.
 

Loading Comments...