In my continuing efforts to troll the internets, I have now set up a DNS server and some additioinal web "sites". ;)

0
0
0
s2sdefault

Sure, we can spoof a MAC Address to something totally random when involved in some... shenanigans... but what if you REALLY wanted to troll someone?

0
0
0
s2sdefault

For a while now I have been wanting to set up some kind of Kali HackBox. Sure, it's a piece of cake to simply spin up a VM or cloud instance, but lacking hardware powerful enough to run VMs, and budget for Clouds, what is one to do? I have an old laptop here... what would it take to make this a fully remotely accessible HackBox?

0
0
0
s2sdefault

Unlike many home users, I have an actual firewall protecting my internet connection. And unlike many businesses I've worked with, I want the tightest security possible, not just An-Any-Allow as is so depressingly common. I've managed to do so, but not without a few hiccups along the way. Here are a few of the extra ports and rules I've had to create.

0
0
0
s2sdefault

Several months ago I read a brief article going over some of the primary limitations of WAF which echoed my own personal viewpoint, and far better written than I could reasonably accomplish. While that part was very insightful, the last bit quickly descended into a sales pitch. Since then, I have wanted to reference that article at work, but couldn't really do so since the sale pitch was for a product that wasn't "ours". So I'm just going to poach the content I want, leave out the sales pitch, and credit the source. :D

0
0
0
s2sdefault