Category Archives: Linux

Compiling GhidraNinja’s Pico Debug’N’Dump

What is the Pico Debug’N’Dump? The Pico Debug’N’Dump is a RPi Pico-based board designed by @ghidraninja used for hardware hacking. It makes use of the Pico capability to provide a flexible platform. In particular, it comes with four different firmware … Continue reading

Posted in Hacking, Hardware Hacking, Linux | Tagged | Leave a comment

Recovering data from a corrupted USB thumbdrive using ddrescue

A friend asked me for help. He has a USB thumbdrive that he used for backup and when he plugged it into his Windows system, Windows wanted to re-format the drive (and therefore erase his backups). Obviously a sub-optimal solution, … Continue reading

Posted in Linux, System Administration, System Engineering, Technology, Uncategorized | Tagged , , , , , , | Leave a comment

Using bash to monitor devices entering/exiting a LAN

Someone asked me for help on a scripting problem, and it seemed both simple and interesting. They had a raspberry Pi set up to control some lights, and they wanted to turn lights on and off if a set of … Continue reading

Posted in Hardware Hacking, Linux, Shell Scripting | Tagged , , , , , , | 1 Comment

Installing pyftdi on Ubuntu 18.04 for FT232H and FT2232H boards

Why use  FT232H and FT2232H boards? I wanted to use a FT232H board for some hardware hacking. The FTDI FTxxx family of devices and boards based on this chip is categorized as a Multi-Protocol Synchronous Serial Engine (MPSSE), which can … Continue reading

Posted in Hacking, Hardware Hacking, Linux, Security | Tagged , , , , , , , , , , , , , , | Leave a comment

Metasploit+Amazon SES, or debugging Sendmail’s SMTP Authentication

TL;DR: Debugging Sendmail’s SMTP AUTH option is not well documented. I integrated Metasploit Pro with Amazon’s SES/Sendmail, and this describes the debug process I used. We have an Amazon EC2 system using SES (Simple Email Service) running Sendmail.  We use … Continue reading

Posted in Hacking, Linux, Security, System Administration | Tagged , , , , , , , , , | Leave a comment

LetsEncrypt + Amazon EC2 = SSLLabs A Rating

I wanted to easily add web security to a static AWS EC2 website to improve the search rankings. I found a guide by Ivo Petkov however there were a few problems with his instructions. I followed his advice: sudo yum install … Continue reading

Posted in Linux, Security, Shell Scripting, System Administration, System Engineering, Uncategorized, Web Security | Tagged , , , , , , , | Leave a comment

Building a Teensy 3.2 w/SD and 8 position DIP switch + Reset button

I’ve always wanted to build a versatile Teensy-based device for use in physical security penetration testing. I’ve seen Irongeek’s device, and Mike Czumak’s dongle,  but neither of these had an SD card, and only had a 4 of 5 position … Continue reading

Posted in Hacking, Linux, Security | Tagged , , , | Leave a comment

Scanning for confidential information on external web servers

One of my clients wanted us to scan their web servers for confidential information. This was going to be done both from the Internet, and from an internal intranet location (between cooperative but separate organizations). In particular they were concerned … Continue reading

Posted in Linux, Security, Shell Scripting | Tagged , , , , , , , , , , , , , , , , , | 1 Comment

Setting up Kali 1.1.0 on the new Raspberry Pi 2

My new Raspberry Pi 2 arrived, and I wanted to install Kali on it. I was preparing to follow the steps of Richard Brain,  but before I started, the folks at Kali tweeted that there was now a download available.  … Continue reading

Posted in Hacking, Linux, Security, System Administration | Tagged , , | 1 Comment

Extracting shell commands from Kali’s application menu

I use the Linux command line whenever I can.  Using the mouse to execute something when my fingers are on the keyboard irritates me. I was using the Kali linux distribution to do some pentesting. And I was getting frustrated. … Continue reading

Posted in Linux, Security, Shell Scripting | Tagged , , , | Leave a comment