Digging passwords in Linux swap
Quick exploration of the forensic/post exploitation possibilities using the GNU Linux swap memory and introduction (...)
Thursday 20 July 2017, by Emeric Nasi
VNC to access Kali Linux on Raspberry Pi
Simple HowTo for a secured remote graphical HMI access on Kali 2 installed on Raspberry Pi 3. Probably also works (...)
Monday 30 May 2016, by Emeric Nasi
Linux filesystem security scans
Some useful commands that can be used by an admin to scan his filesystem for common threats and misconfiguration (...)
Sunday 5 December 2010, by Emeric Nasi
Linux security using a limited group (PAM modules)
Using PAM modules to create a restricted group in order to "jail" or "limit" some users (mostly system (...)
Friday 27 August 2010, by Emeric Nasi
How to secure Linux users
How-to simply and securely manage the various users and system accounts on a Linux box.
Saturday 14 August 2010, by Emeric Nasi
HTTP backdoor using POSIX file capabilities and PHP
Use POSIX file capabilities and PHP to create a backdoor that opens a root back-channel to the attacker’s PC on port (...)
Friday 18 June 2010, by Emeric Nasi
Create a daily system-update script
How to
create an automatic update task for various GNU Linux distributions.
This script should be run daily or (...)
Thursday 17 June 2010, by Emeric Nasi
Build a recovery toolkit
All security guides recommend you should have a recovery toolkit constituted of static linked important binaries. (...)
Thursday 10 June 2010, by Emeric Nasi
Real-time system alerts using Twitter OAuth (implementation)
In this article I explain how to implement the solution discussed in the article called System real-time alerts (...)
Sunday 6 June 2010, by Emeric Nasi
Real-time system alerts using Twitter OAuth (the Theory)
In this article I give the theory about Why and How use Twitter as a real-time alert system for your systems (...)
Sunday 6 June 2010, by Emeric Nasi