How to Locate the Dashboard in OWASP Juice Shop

The OWASP Juice Shop is a widely used platform in cyber security education and penetration testing, simulating a vulnerable web application where users can practice identifying and mitigating security flaws in a controlled environment. One core challenge in Juice Shop is finding hidden functionality, such as the admin dashboard, which often includes sensitive operations and insights into an application’s internal workings. This guide will walk you through finding the Juice Shop dashboard, highlighting techniques that improve your penetration testing skills in real-world scenarios.

Note: This article is intended for educational and authorized penetration testing purposes only. Always obtain explicit permission before testing any live system.

Continue reading “How to Locate the Dashboard in OWASP Juice Shop”

How to Set Up and Host a Chat on the Dark Web

Setting up a PHP-based chat application like Le Chat on a Linux virtual machine (VM) with MySQL and Apache, specifically configured to run over the Tor network, involves several steps. Even if you don’t want to run an entire .onion empire, it is good to know the basic rules of such systems, how to set it up and what are the limits of Tor’s privacy. After some research in the topic I found dozens of very different chats on the Onion network that run Le Chat, some are very friendly and legal, the other are dark and hostile. Let’s take a look at how can you host your own instance from the comfort of your chair!

Continue reading “How to Set Up and Host a Chat on the Dark Web”

Automating APIs with Ansible

In today’s IT world, automation is not just a convenience, it’s a necessity. As organizations scale, managing infrastructure, applications, and services manually becomes impossible. This is where automation and configuration management tools like Ansible come into play. Ansible, with its simple yet powerful automation capabilities, can be used to manage a wide array of IT tasks, including API automation.

Continue reading “Automating APIs with Ansible”

Securing Your Data: Using LUKS to Encrypt a Partition

Data security is paramount in today’s digital age. Whether you’re concerned about personal privacy or safeguarding sensitive work-related information, encrypting your data is an effective way to protect it from unauthorized access. In this blog post, we’ll explore how to use LUKS (Linux Unified Key Setup) to encrypt a partition, /dev/nvme0n1p3, on a Debian Bookworm desktop. LUKS is a widely-used disk encryption specification for Linux systems that provides robust security for your data.

Continue reading “Securing Your Data: Using LUKS to Encrypt a Partition”

Deploying Mailcow: A Self-Hosted Mail Server In Docker

Setting up an efficient mail server is crucial for individuals and organizations. Mailcow, a comprehensive mail server solution, offers a user-friendly interface and a wide range of features. In this guide, I’ll walk you through the process of installing Mailcow on Debian Bookworm and Docker, ensuring a smooth and hassle-free experience.

Continue reading “Deploying Mailcow: A Self-Hosted Mail Server In Docker”

Import Passwords From KDBX Or CSV Files Into Passbolt

In today’s dynamic business environment, effective password management is crucial to ensure the security of sensitive information. Passbolt, an open-source password manager, provides a robust solution for organizations looking to enhance their credential management practices. We’ll explore the process of importing KDBX and CSV files into Passbolt, helping the transition to a more secure and efficient password management system.

Continue reading “Import Passwords From KDBX Or CSV Files Into Passbolt”

Installing and Using Chkrootkit on Debian Linux

In an era where cyber security threats are evolving rapidly, safeguarding your Debian system against potential risks is very important. Rootkits, a type of malicious software designed to gain unauthorized access to a computer system, pose a significant threat to the integrity of your Debian Linux installation. To fortify your defenses, one effective tool to consider is Chkrootkit, a simple yet powerful rootkit detector.

Continue reading “Installing and Using Chkrootkit on Debian Linux”

Installing and Using RKHunter on Debian Linux

In the evolving landscape of cyber security threats, safeguarding your Debian Linux server is a must. Rootkit Hunter, commonly known as RKHunter, is a powerful tool designed to detect and remove rootkits, malware, and suspicious system behavior. In this guide, we’ll walk you through the process of installing and using RKHunter on Debian Linux to fortify your server’s security.

Continue reading “Installing and Using RKHunter on Debian Linux”

Install Passbolt Self-Hosted With Podman

Passbolt is an open-source password manager designed for teams and organizations that prioritize security and privacy. It offers the following features:

  • Security-First Approach: Passbolt puts security first, with a security model that supports user-owned secret keys and end-to-end encryption, regularly assessed by top penetration testers.
  • Built for Collaboration: It allows secure sharing of credentials with powerful auditing tools and unparalleled granularity for access controls and encrypted data.
  • Privacy Focus: Headquartered in the EU, Passbolt prioritizes privacy and is designed to comply with European privacy laws.
  • Versatility and Control: Passbolt is designed to put users in control of their data and protect them from a wide range of potential threats, making it suitable for security-conscious organizations.

Passbolt is trusted by a wide range of organizations, including Fortune 500 companies, the defense industry, universities, and startups, and has received 4,000 stars on GitHub as a seal of approval for its reliable and secure password management. It is also available as a free and open-source solution, with an extensible API for developers.

Continue reading “Install Passbolt Self-Hosted With Podman”

How To Configure An Apache SSL Reverse Proxy on Linux?

What is Apache?

Apache is a free and open-source cross-platform web server software that allows users to deploy their websites on the internet. It was launched in 1995 and has been the most popular web server on the Internet since April 1996.

What is a reverse proxy?

reverse proxy is a server that sits in front of web servers and forwards client requests to those web servers. It acts as an intermediary, intercepting and inspecting incoming client requests before forwarding them to the web server. Reverse proxies can provide additional levels of abstraction, control, security, and performance optimization. They are commonly used for load balancing, web acceleration, and to hide implementation details about the web servers.

What is SSL?

SSL, or Secure Sockets Layer, is a protocol for establishing authenticated and encrypted links between networked computers. Its current iteration is called TLS (Transport Layer Security).

Continue reading “How To Configure An Apache SSL Reverse Proxy on Linux?”

How to configure an SSL reverse proxy with Nginx?

reverse proxy is a server that sits in front of web servers and forwards client requests to those web servers. It acts as an intermediary, intercepting and inspecting incoming client requests before forwarding them to the web server. Reverse proxies can provide additional levels of abstraction, control, security, and performance optimization. They are commonly used for load balancing, web acceleration, and to hide implementation details about the web servers.

Continue reading “How to configure an SSL reverse proxy with Nginx?”

How to set up vhosts in the Apache2 webserver?

Apache2 is a free and open-source web server that allows users to deploy their websites on the internet. It was first released in 1995 and is maintained by the Apache Software Foundation. Apache is fast, reliable, and secure, and it runs on a large percentage of web servers, making it one of the most popular choices for website owners, developers, and hosting providers.

Continue reading “How to set up vhosts in the Apache2 webserver?”

How To Install Vaultwarden Password Manager In Podman?

Vaultwarden is an open-source password manager that is a fork of Bitwarden. It is written in Rust and is designed to be lightweight, easy to set up, and run on various platforms. Vaultwarden is an alternative backend for the password manager Bitwarden, and while it does not implement the same feature set as the Bitwarden server, its setup is much simpler. Vaultwarden is a great option for small businesses because it is lightweight and runs well on devices with limited resources, such as Raspberry Pi and Synology NAS. It is also easy to set up and use, making it a great choice for businesses that do not have dedicated IT staff. Additionally, Vaultwarden is open-source, which means that businesses can customize it to meet their specific needs.

Continue reading “How To Install Vaultwarden Password Manager In Podman?”