Home
Chirpy
Cancel

April's fool

Introduction Thought I would write a diary entry with my two blunders of the week. The first one is related to a ceph cluster manipulation that killed a live production server on a busy thursday m...

Windows print server

Introduction This is a quick write up on a couple of different ways to set up a print server on a windows environment. There are generally two ways of going about this. Either add the required ser...

Home automation

Introduction This article won’t be as technical as other ones in here but I figured it would be interesting regardless. Prices have in general shot up in the last couple of years here in europe so...

Building a CMDB with grafana and low code

Introduction Docker and software in general has allowed us to spin up services within seconds as opposed to hours/days a couple of years ago. In a way it’s great but without documentation you quic...

SSO part 2 OpenId Connect

Introduction SSO stands for single sign on. Building on the first part of our SSO journey let’s now configure the identity provider, our domain controller and the active directory in order to have...

SSO part 1 Wireless network Access Control with 802.1x

Introduction I thought it might be cool to share some of the things I’ve been working on so far. This article is the first in the series where I try to break silos and integrate my systems into a ...

Live backups with btrfs

Intro: Backup and restore with btrfs snapshots You’re working from home and forgot your laptop at work? You want to go on a trip and want a way to use your laptop without bringing it with you? Wel...

Evil twin attack

This tutorial will guide you through the process of compromising a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply these techni...

Man in the middle attack

This tutorial will guide you through the process of compromising and phishing a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply...

Trying out an android Remote Access Trojan (RAT)

This tutorial will guide you through the process of infecting Android phones with a trojan. The author gives this example for educational purposes and does not incentivise you to apply these tec...