Search results

  1. I

    Debian Virtual Machine Lost SSH

    To set a static IP you don't need to reserve it from the router, it is sufficient to reduce the range in which the dhcp process is allowed to assign IP addresses and statically assign the IP from the machine itself. In your case, you can also leave as it is, the only thing you're required to do...
  2. I

    Can't connect to pptp vpn

    You shouldn't do it as that is an obsolete protocol: https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol But if you really need to, here's a guide that I tested in a VM (Ubuntu 18.04LTS): https://www.linuxbabe.com/linux-server/setup-your-own-pptp-vpn-server-on-debian-ubuntu-centos...
  3. I

    Antivirus

    Actually, there are AV for Linux. I can't suggest to use them because, as @HaxNet said: But if you need an AV for enterprise/paranoid usage, you can use: Microsoft Defender APT for Linux...
  4. I

    Text-to-speech software for Debian

    Take a look at this solution: https://elinux.org/RPi_Text_to_Speech_(Speech_Synthesis) You should be able to use the Google's text-to-speech engine following the example on the page. Unfortunately the best software that does it is often made from who's able to monetize it. PS: use `pdftotext`...
  5. I

    Lightest LINUX + NIPS, SSL, PACKETCAP, ETC

    Best option in my opinion is FreeBSD. Learning curve from Linux is very low. https://www.freebsd.org/ To use it as a routing/gateway refer to: https://www.freebsd.org/doc/faq/networking.html#idp49697784 It is good for your needs: Lightest version of linux => not linux but low learning curve...
  6. I

    How do I become a professional ethical hacker?

    I would say to learn the basics of networking, then how to become a penetration tester. Most of the work is to know how OSs generally work (especially Linux), a programming language (Python is the most useful for hacking), then the industry standard software and common vulnerabilities. The CEH...
  7. I

    How to write a SUID program in C (and other languages)?

    Recently, I configured a vulnerable server (in a VM), with intended vulnerabilities to exploit to gain access to the system and escalate privileges. One way to get root access was to debug a SUID program written by me. Even if it worked, it was the jankiest way to do it (basically used...
  8. I

    create an array of multiple multi-line text for script to use..

    I'm not completely understanding what you're up to... But to chose elements from an array I've just written: count=0 for $i in $array; do echo $i; count=$(($count+1)); done | nl printf "Choose the element with a number: " read -l choice # Check if a number [ "$choice" -eq "$choice" 2>/dev/null...
  9. I

    Updating the Bios on a Lenovo c940?

    The easiest option is to use fwupdmgr! I have a recent Thinkpad laptop and I updated the BIOS running Arch Linux. On Ubuntu, fwupdmgr should be already installed, otherwise: # Install the daemon sudo apt install fwupd # Start the service sudo systemctl start fwupd # Look for updates and install...
  10. I

    restrict number of cpu cores per user in multicore system

    Maybe it's not what you want... I guess you can do it trying harder with cgroup and using configs like the one in the example found on the cgreoup page on the Arch Wiki: group groupname { perm { # who can manage limits admin { uid = $USER; gid = $GROUP; } # who can add...
  11. I

    bash or fish for shell?

    Zsh is a great shell that can integrate some of the fish functionalities (zsh-autosuggestions, zsh-syntax-highlighting) that can be integrated in the .zshrc with almost unlimited possibilities of customization. This is my configuration (I'm working to integrate the plugins in the main config...
  12. I

    Shutdown system after 3 minutes

    sudo crontab -e Depending on the implementation of cron shipped with your distro, this might not work after an hard shutdown, bot on most systems, it will: @reboot /path/to/shutdown +3
  13. I

    ssl is not working with domain

    Hello! Since you're configuring this in an home network, if you have a small amount of devices that access this https site on your local server, I would be my own CA and make my browsers to trust my certificate. https://www.wikihow.com/Be-Your-Own-Certificate-Authority This will make your...
Top