Disclaimer Scripts are not run in a sandbox and thus could accidentally or maliciously damage your system or invade your privacy. Never run scripts from third parties unless you trust the authors or h| ITTavern.com
What is a rogue DHCP server # A rogue DHCP server is an unauthorized DHCP server that distributes knowingly or unknowingly wrong or malicious information to clients that send DHCP discover packets wit| ITTavern.com
I won't go into specific cases in this blog post. This is a general guide on how to gather the necessary information that will help you to get your problem fixed. In this post, I'll use a Linux client| ITTavern.com
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so. Example script The examp| ITTavern.com
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you. Topics: use ca| ITTavern.com
The goal of this post This post is a quick reference for using the display filters in Wireshark. The display filter is used to filter a packet capture file or live traffic, and it is essential to know| ITTavern.com
What is this about? Let me start with; there is no perfect security. Your goal is to make it as difficult as possible to 'break in', so it is simply not worth it. There is a balance between security a| ITTavern.com
Disclaimer: Please read the whole post before you start. This will help you avoid a lock-out Generating a secure key pair SSH keys use asymmetric cryptographic algorithms that generate a pair of se| ITTavern.com
Disclaimer: Only scan networks you have permission for. Many VPS providers do not allow the scanning of other networks and can cause you trouble. Please be aware of it. Installation I won't cover the| ITTavern.com
So, since I am too stupid to remove empty lines easily, I present to you my overcomplicated solution. Search for the Find / Replace in the operations and replace ^(?:[\t ]*(?:\r?\n|\r))+ with nothing.| ITTavern.com
There are various implementations. I am using nmap-ncat on rockOS 8 on both hosts. Netcat's using TCP by default and this test is not limited by disk I/O from what I understood. That said, it is not| ITTavern.com
rsync is a CLI tool that covers various use cases. Transfering data, creating backups or archives, mirroring data sets, integrity checks, and many more. Reference for this article: rsync version 3.2.| ITTavern.com
In this article, I'll use Ubuntu 22.04 (Debian-derivative) and rockyOS 9.2 (RHEL-derivative) as references. If it is not mentioned, commands are the same for both systems. Basics # Cron jobs are sched| ITTavern.com
Port knocking is like a secret handshake or magic word between client and server. It can be used in various ways, but most commonly as a security feature to deny all contact to a specific service - li| ITTavern.com
Rclone is an open-source cross-platform data synchronization application focusing on cloud services. It can act as the CLI for your cloud storage. Rclone provides a broad set of features, from simple| ITTavern.com
Getting started with dig Please note that this blog post is not an in-depth guide on DNS and dig. It will provide you with the basics, and more advanced topics that are out of the scope. Some more adv| ITTavern.com
I want to show you how to get started with Fail2Ban to keep your Linux servers more secure. For this blog post, I've used Ubuntu 22.04 LTS as a reference and will use it to secure my SSH service with| ITTavern.com
In this post, I'll try to explain the syntax and use of an URL and the difference between URI, URL, URN, and URC. URL explained # This will be our example for this post: https://username:password@www| ITTavern.com
Asking the right question In this post, I want to present some simple questions on how to start any troubleshooting session. The main goal is to gather enough information to narrow down the root cause| ITTavern.com
I am a big fan of tmux, but there is - without adding plugins - a way to save and restore sessions or layouts. For this reason, I've decided to work on a bash script that restores and builds my favori| ITTavern.com
In this blog post, I assume that tcpdump is already installed since the installation method can vary from system to system, and basic Linux and CLI skills already exist. I'll try to keep it as short a| ITTavern.com