When creating a security lab, I spend a lot of hours troubleshooting this due to a lack of articles and videos, which mostly people use Virtualbox. Hope can help this article too. Let's Start: Here's our architecture: Step 2: Configure our bridge in our data center network: Note: dont make any value except to the desired name Step 3: Assigned the bridge and config for the VM's I got two virtu
Want to keep Ubuntu updated? Run these commands on your PC via terminal, or create a .sh file and add the following commands: Bash If you don't know how to create the .sh file, no problem! Just navigate to the folder in your terminal and run the following: touch file.sh ----> creates the file nano file.sh -----> opens the file in the terminal Finally, add the previous commands to the file, press C
What if I told you that the best way to defend your server isn't to block attackers, but to make them wait? Instant drops (TCP RST) are too kind. They let the botmaster know they need to rotate IPs or try a new tactic. Meet "LAG", my bio-sync active terminal defender (and, ironically, my username). In this post, we're not just deploying a firewall; we're deploying a marshland. We're turning my Wor
Comments
Most developers use malloc without thinking much about what happens underneath. This project is an attempt to explore that layer by building a memory allocator from scratch in C. The allocator implements malloc, free, calloc, and realloc without relying on libc’s heap functions. It focuses on: Thread safety Per-thread caching (tcache) Efficient free block management using bins mmap-based memory g
What is the real difference and when should you use each When people first hear about privacy tools on the internet, two names come up again and again. VPN and Proxy. Many think they are the same. They are not. They solve similar problems but in very different ways. This article will explain the difference in a simple and clear way. No heavy words. Just what you need to understand and use them cor
Stop Guessing Whether Debian Package Files Changed: Practical debsums for Integrity Checks A package can be fully installed and still not be in the state you think it is. Maybe a file was edited by hand. Maybe a cleanup script went too far. Maybe you are checking a host after a rough shutdown, disk issue, or suspicious change and you want one simple answer: Did files shipped by Debian packages c