Bruno GilWreath Network WalkthroughPivot through a network by compromising a public facing web machineJan 17, 2023Jan 17, 2023
Bruno GilHow to block ads with Pi-holePi-hole® is a DNS sinkhole that protects your devices from unwanted content without installing any client-side software. This means that…Mar 26, 2022Mar 26, 2022
Bruno GilLog4shell: RCE in Log4jOn the 9th of December 2021, a new critical vulnerability (CVE-2021–44228) was discovered in the logging application log4j, used by Java…Dec 17, 2021Dec 17, 2021
Bruno GilHow to install proxychainsIn order to do penetration testing anonymously and decrease the possibility of identity detection, hackers need to use an intermediary…Feb 5, 2020Feb 5, 2020
Bruno GilHow phishing works: SetoolkitSET Tool Kit: The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the humans. SET has quickly…Feb 5, 2020Feb 5, 2020
Bruno GilFTP Backdoor Command ExecutionIn this story we’ll use metasploit to create a backdoor in an outdated ftp server and be able to execute remote commands.Feb 4, 2020Feb 4, 2020
Bruno GilHow to use IpTablesIptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a noviceor a system administrator…Feb 3, 2020Feb 3, 2020
Bruno GilInstalling Nagios on CentOs 7Nagios is a free and open source computer-software application that monitors systems, networks and infrastructure, which makes the process…Jun 24, 2019Jun 24, 2019
Bruno GilInstalling Wordpress on CentOs7If you want to create your own website or blog, wordpress is the easiest way to acomplish it, so in this tutorial we’ll go through the…Jun 24, 2019Jun 24, 2019
Bruno GilCreating a DNS server using WebminIf you have Webmin installed in your machine, you can easily create a working DNS service in just a few simple steps:Jun 24, 2019Jun 24, 2019