Install GitLab CE

- 3 mins read
GitLab is a comprehensive DevOps platform that provides source code management, CI/CD pipelines, and collaborative tools for software development. GitLab CE is its the open-source and free version, and ideal for individuals and small teams due to its cost-effectiveness, transparency, and robust feature set. This post is a step-by-step install guide for GitLab CE on Ubuntu 24.04. 1. Update System Packages First, update your package lists and upgrade any existing packages to their latest versions.
Overview and Objective This document outlines the process for setting up a site-to-site OpenVPN connection using pfSense. The goal is to establish a secure, encrypted tunnel between two separate networks over the internet, ensuring secure communication and data transfer between the connected networks. The objective of this guide is to provide step-by-step instructions for configuring this site-to-site OpenVPN connection using SSL/TLS on pfSense. This setup aims to create a secure link between two remote networks, allowing for seamless and secure communication as if they were on the same local network.

Install Jenkins

- 3 mins read
Jenkins is an open-source automation server that helps automate the building, testing, and deployment of software projects. Jenkins is widely used for its flexibility, extensive plugin ecosystem, and strong community support, making it an excellent choice for continuous integration and continuous delivery (CI/CD) needs. This post is a step-by-step install guide for Jenkins on Ubuntu 24.04. 1. Install Java Since Jenkins is a Java-based application, we’ll need to install OpenJDK 17 for the latest and stable Jenkins setup.
Overview Welcome to this blog post where we’ll be doing a Capture the Flag (CTF) problem-solving challenge. CTF is a popular activity among IT security practitioners, especially with penetration testing professionals and enthusiasts. Today, we’ll be solving MATRIX-BREAKOUT: 2 MORPHEUS, the second installment in the Matrix-Breakout series, with the subtitle “Morpheus:1”. Inspired by the iconic first Matrix movie, this challenge was contributed on VulnHub in late 2022 and rated as Medium/Hard.
Buffer overflow attacks have been a topic of discussion in the cybersecurity world for a long time, but I believe there’s always room for another perspective. In this writeup, I will take a unique approach and walk you through the process of executing a buffer overflow attack using VSCode as my code editor and BurpSuite to generate the initial request in Python. My goal is to provide a clear and concise explanation of this complex topic, so that even those with limited experience can understand the mechanics behind buffer overflow attacks.
*Note : This is part of a series for how I build Windows Enterprise Test environment. * In this guide, I will walk you through the steps to configure a newly installed Windows 10 machine to join an existing Active Directory domain using PowerShell. The commands for the configuration process will be included in a script and each command will be thoroughly explained to help you understand the process. By the end of this tutorial, you will have a clear understanding of how to join a Windows 10 machine to an Active Directory domain using PowerShell.
*Note : This is part of a series for how I build Windows Enterprise Test environment. * In this installment of the series, we will delve into the process of installing and configuring a Windows Active Directory using PowerShell. The goal is to simplify the installation procedure by compiling a set of PowerShell scripts, enabling the creation of a test environment with ease and convenience whenever an application needs to be tested.
Passwordless SSH logins offer a secure and efficient way to access remote servers. Unlike traditional authentication methods that rely on passwords, passwordless SSH utilizes cryptographic keys to verify your identity. This eliminates the need to constantly enter your username and password, making it faster and more convenient. It’s widely recognized that passwords are vulnerable to hacking and brute force attacks. By using passwordless SSH, you can significantly enhance the security of your remote connections.
In this post, I will be providing an overview on how I set up an application server to host my Python data visualization using popular frameworks like Bokeh or Dash. The server is built on Ubuntu and utilizes Nginx as a reverse proxy and Certbot for securing the connection with HTTPS. Please note that this guide is not exhaustive or highly detailed, as it is intended for internal access and use only.