Skip to content

DFT Blog

Knowledge Share Drive

  • Linux/Unix
  • Raspberry Pi
  • Web
  • Networking
  • Hacking
  • General
  • Programming
  • pfSense

Author: Davi Torres

February 23, 2022

Network Bridge, Link Aggregation, and VLAN in Linux

On-prem servers must deal with different challenges that Cloud providers magically take care of and make it look very easy. […]

February 19, 2022

File Permissions and Proprieties in Linux

File (and directory) permissions in Linux and Unix-based systems define what the owner, the group and the others can or […]

February 7, 2022

Recommended Hardware for Home Lab

This is a shortlist of some essential hardware for any home lab: Single Board Computers Raspberry Pi 4 [Link] Full-featured […]

January 22, 2022

Working with CSV and XML in Python

In the following example, the Python code will create a dictionary with the headers (fields on the first line) from […]

January 13, 2022

Sandboxing Applications with AppArmor, Firejail and More

Sandboxing is a tecnique for confining application to access specific resources and protect the operating system from vulnerabilities and threats. […]

January 13, 2022

Setting Up a FreedomBox on a VM or RPi

FreedomBox is a Debian-based self-hosting server that allows the quick deployment of many applications and services with a single click […]

January 9, 2022

Affine Cipher Cheat Sheet

Affine Cipher is a relatively simple way for encrypting/decrypting data with low CPU cost but with the expensive of low […]

January 4, 2022

Web Exploitation Cheat Sheet

Web exploitation cannot happen without proxying and advanced tools such as: Burp Suite Not open-source but offers a free community […]

December 31, 2021

Active Directory Post-Exploitation Cheat Sheet

After getting the foot in the door in a pentesting scenario or competition it is time for gathering more data […]

December 31, 2021

Active Directory Exploitation Cheat Sheet

While pentesting a Windows network some tools and essential to have handy: Enum4Linux – Quick enumeration. Kerbrute – Enumerate domain […]

Posts navigation

Older posts
Newer posts

Search

Categories

  • Linux/Unix
  • Raspberry Pi
  • Web
  • Networking
  • Hacking
  • General
  • Programming
  • pfSense

Recent Posts

  • Setting Up a Centralized Log Server with GrayLog on Ubuntu 20.04
  • Linux Log Management and Audit
  • Managing Partitions from the Command Line
  • How to Encrypt Partitions with LUKS
  • Linux Hardening Guide
  • Setting Up the Linux Firewall IPFire
  • Most Common Linux File Systems – EXT vs XFS vs ZFS vs Btrfs
  • Managing Containers with LXD – Cheat Sheet
  • High Performance Encrypted Proxy with ShadowSocks
  • AWS S3 Glacier Cheat Sheet (The Ultimate Backup Layer)
  • Network Bridge, Link Aggregation, and VLAN in Linux
  • File Permissions and Proprieties in Linux
  • Recommended Hardware for Home Lab
  • Working with CSV and XML in Python
  • Sandboxing Applications with AppArmor, Firejail and More
  • Setting Up a FreedomBox on a VM or RPi
  • Affine Cipher Cheat Sheet
  • Web Exploitation Cheat Sheet
  • Active Directory Post-Exploitation Cheat Sheet
  • Active Directory Exploitation Cheat Sheet
Copyright © All rights reserved. By DFTorres.ca