Speed up SSH for quicker data transfer. Why? With current internet speeds and file sizes, it’s common to find ourselves frequently transferring (increasingly) large files. This is good, but it’s ...
Harden the default SSH configuration settings to reduce your system’s attack surface on both your server and client. Also, install and configure fail2ban in your server. Why? SSH is the privilege...
Dynamically implement IPv4 and IPv6 firewall rules for each network interface with nftables and NetworkManager. If the interface comes online or changes IP, the rules are automatically updated. If ...
Add dynamic IP anti-spoofing rules to your nftables firewall with NetworkManager. Prevent spoofing of your computer’s network interfaces using dynamic nftables rules. Why? I while ago I wrote my ...
Learn the essential steps to migrate your Linux firewall configurations from iptables to nftables. This guide covers syntax, commands, best practices for a smooth transition and offers a good set o...
Some time ago, I wrote the post Upload a package to PyPI, but, how everything evolves, this time I decided to evolve and take advantage of all the power of GitHub Actions. GitHub actions GitHub a...
What are dotfiles? Dotfiles are files where the programs store their configuration. Dotfiles are named that way because most of them starts with a dot “.”, although, nowadays, it’s common to use ...
Process argument spoofing (command line spoofing or program argument spoofing) is a technique that allow us to spawn a process with arguments and override those arguments at execution time. With th...
If you read my article Configuring Neovim as Python IDE, you already know that one of mi favorite editors is [neo]vim. Between other reasons, when I’m using [neo]vim I feel more focused, I don’t kn...
Headless info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.60 Target machine (victim, Headless): 10.10.1...