Image for post
Image for post
Photo by Bence ▲ Boros on Unsplash

With the holiday season around the corner — there is some more time to do a DIY project. I’ll be trying to make my own home a little smarter, using a Raspberry Pi as the main home controller. The Google Home and its smaller brother are beautiful devices with many amazing features.

In this article, I’ll lay out the steps I’ve taken to install the Google Assistant on a Raspberry Pi. You will be able to have the following functionalities:

  • Google Assistant (most features, except media playback on the Pi)
  • Voice / Hotword activation: “Hey Google” or “Ok Google” and…


HackTheBox.eu is a platform that provides access to vulnerable VM’s. These machines offer a way to practice your offensive security skills in a realistic manner. The vulnerabilities on these machines exist in the real world(!). I write about my attempts to break into these machines. There are usually two levels of access on a machine that I document: user and root/administrator access.

Image for post
Image for post
Where’s Wally?

Recap

Waldo is a Docker stack. The first machine exposes a vulnerable web server which allows directory traversal. The str_replace method to escape directories is unsafe. Along with poor user permissions, anyone is able to read most file contents…


HackTheBox.eu is a platform that provides access to vulnerable VM’s. These machines offer a way to practice your offensive security skills in a realistic manner. The vulnerabilities on these machines exist in the real world. I write about my attempts to break into these machines. There are usually two levels of access on a machine that I document: user and root/administrator access.

Image for post
Image for post

Recap

This was an interesting machine. I did not have prior experience with SSH Tunneling, so that was a nice thing to learn more of. Gaining access to the user account was fairly straightforward. Poor encryption, along with re-using…


HackTheBox.eu is a platform that provides access to vulnerable VM’s. These machines offer a way to practice your offensive security skills in a realistic manner. The vulnerabilities on these machines exist in the real world(!). I write about my attempts to break into these machines. There are usually two levels of access on a machine that I document: user and root/administrator access.

Image for post
Image for post

Recap

The Active box is a Windows Domain Controller machine running Microsoft Windows 2008 R2 SP1. It was a fun machine to get into, since I am less familiar with Windows enumeration and privilege escalation. It’s a pretty nice…


Image for post
Image for post

This is a little blogpost about installing the necessary environment to use an external GPU (eGPU) on an older, Thunderbolt 2 equipped MacBook Pro, e.g. for use in Deep Learning research. The hardware used in this test are:

  • MacBook Pro Retina mid-2015 model
  • NVIDIA Titan XP
  • Razer Core v2 enclosure
  • Thunderbolt 3 to Thunderbolt 2 adapter

You will need macOS High Sierra. I have ran the same tests on the latest release macOS Mojave, but it does not work at this moment.

Janne Spijkervet

Composer and MSc Artificial Intelligence student at the University of Amsterdam, applying deep learning to music. Also a bit into hacking. Twitter: @spijkervet

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store