Exploring Kali Linux

So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux

Doing Statistics in awk

Statistics in awk

One exercise that offers a lot of interesting challenges in coding is to use a programming language for an application that it's not intended to be used for. Writing a Fortran compiler in TECO and solving the Towers of Hanoi problem in the troff text formatter are two examples from the legendary Hacker Purity Test. … Continue reading Doing Statistics in awk

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Obfuscated Unix Scripting with sed

Okay, so I had something else planned for this Friday night, but the project I'm working on that I wanted to share is taking a lot longer than expected, so I'm having to push the publication date back a few days while I get all the code working and create all the visuals in SVG. … Continue reading Obfuscated Unix Scripting with sed

Unix vs. Windows: How to Check and Convert Between the Two File Formats

Different operating systems use different formats for line breaks, and this can cause confusion and difficulty for a lot of newbies. In this article I will explain the difference between the Unix file format used by Linux and MacOS and the DOS format used by Windows, and I will also show you how to check … Continue reading Unix vs. Windows: How to Check and Convert Between the Two File Formats

Setting Up a Home Hacking Lab

I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab

Raspberry Pi Reboot

I just rebooted my Raspberry Pi with all new software. The reason? Because the version of Raspbian it was running was so old that even the package manager was out-of-date and I couldn't upgrade it. So after several frustrating attempts to upgrade to the latest version of Raspbian through the package manager, I finally decided … Continue reading Raspberry Pi Reboot

Arch Linux Hacker Battlestation Setup

When I was using my laptop by itself, I loved to boot into Arch Linux and then use tmux to split the terminal into multiple windows and start a bunch of different programs to make it look all 1337ed out. But when I started using the dual-monitor setup, I started to have problems doing this. … Continue reading Arch Linux Hacker Battlestation Setup

Use SyncTERM as a Remote Login Terminal for the Raspberry Pi

This tutorial will show you how to use the terminal emulator SyncTERM as a remote terminal to a Raspberry Pi. For this you will need two things: 1. a Raspberry Pi running Raspbian and connected to a network; 2. a desktop computer connected to the same network, with SyncTERM installed. The protocol we will be … Continue reading Use SyncTERM as a Remote Login Terminal for the Raspberry Pi

How to Generate Truly Random Numbers in POSIX Systems

Everyone knows about the rand() and srand() functions in the C Standard Library (or any of the equivalents in other programming languages). These functions work together to generate pseudo-random numbers from a seed, thus lending some nondeterminism to the program. But what about truly random numbers? What if you want a stream of random data … Continue reading How to Generate Truly Random Numbers in POSIX Systems