Skip to main content

Linux

FrOSCon 20

·306 words·2 mins
This weekend I attended FrOSCon, an open source event in St. Augustin / Bonn, Germany. On Saturday around lunch time there was a new visitor record of 1200. I don’t know how many more came in the afternoon and on Sunday.

Chemnitz Linux Days 2024

·103 words·1 min
This year marked my inaugural attendance at the Chemnitz Linux Days. The experience was fantastic, and I had the pleasure of connecting with numerous intriguing individuals. Chemnitz Linux Days stands out as one of the premier events in the Linux and open-source community. With 3,200 attendees this year, participants had the opportunity to engage with a diverse array of topics through 94 talks and hands-on workshops.

Walkthrough: Vulnhub - DC: 3

·1561 words·8 mins
Link to Vulnhub DC Challenges Original Description DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

Walkthrough: Vulnhub - DC: 2

·1645 words·8 mins
Link to Vulnhub DC Challenges Original Description Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.

Walkthrough: Vulnhub - DC: 1

·881 words·5 mins
Link to Vulnhub DC Challenges Original Description DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.

Walkthrough: Vulnhub - Djinn:1

·2779 words·14 mins
djinn:1 is the next machine I want to break in. Level: Beginner-Intermediate flags: user.txt and root.txt Format: Virtual Machine (Virtualbox - OVA) Operating System: Linux

Walkthrough: Vulnhub - Me and My Girlfriend

·1549 words·8 mins
In my spare time I like doing CTF (Capture the flag) or solving machines posted at Vulnhub. This time I started Christmas vacation with Me and My Girlfriend: 1. Extracting and importing into Vmware Workstation was straight forward, after the start we need to find the ip address of the vulnerable machine.

Install All Packages After Restore on RPM-based Linux

·301 words·2 mins
In the last days I had a problem with a crashed virtual disk on a WebSphere Application Server. The backup team was able to recover all the data, but the operating system needs to be reinstalled. The operating system was Red Hat Linux, so rpm-based. One of the first tasks after recovery was to identify and reinstall missing packages.