Introduction Docker and software in general has allowed us to spin up services within seconds as opposed to hours/days a couple of years ago. In a way it’s great but without documentation you quic...
SSO part 2 OpenId Connect
Introduction SSO stands for single sign on. Building on the first part of our SSO journey let’s now configure the identity provider, our domain controller and the active directory in order to have...
SSO part 1 Wireless network Access Control with 802.1x
Introduction I thought it might be cool to share some of the things I’ve been working on so far. This article is the first in the series where I try to break silos and integrate my systems into a ...
Live backups with btrfs
Intro: Backup and restore with btrfs snapshots You’re working from home and forgot your laptop at work? You want to go on a trip and want a way to use your laptop without bringing it with you? Wel...
Evil twin attack
This tutorial will guide you through the process of compromising a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply these techni...
Man in the middle attack
This tutorial will guide you through the process of compromising and phishing a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply...
Trying out an android Remote Access Trojan (RAT)
This tutorial will guide you through the process of infecting Android phones with a trojan. The author gives this example for educational purposes and does not incentivise you to apply these tec...
Exfiltrating data from a bank
This tutorial will guide you through the process of bypassing security procedures from your employer. The author gives this example for educational purposes and does not incentivise you to apply...
A simple trojan for Linux
This tutorial will guide you through the process of infecting Linux based computers with a trojan. The author gives this example for educational purposes and does not incentivise you to apply th...
A simple click-jacking exercise
This tutorial will guide you through the process of doing cross site scripting. The author gives this example for educational purposes and does not incentivise you to apply these techniques with...