Täglich Shaarli

All links of one day in a single page.

May 24, 2021

WireGuard VPN Server einrichten (Ubuntu, Raspberry Pi, Linux, Android)

Willst Du selbst einen WireGuard VPN Server aufsetzen, ist das gar nicht so schwer. Das ist bei Ubuntu Linux oder einem Raspberry Pi schnell erledigt.

Attention to Details : Finding Hidden IDORs | by Aseem Shrey (@aseemshrey) | Medium
thumbnail

Attention to Details : Finding Hidden IDORs
This blogpost focuses on the idea of 'attention to details'.
How a huge travel portal's customer PII data could've leaked through some remanant functionality.
This lead me to discover a few IDORs.

de lege data | AG Mannheim: Gemeinsame Verantwortlichkeit von Wohnungseigentümern und Verwalter – Anforderungen an die Art. 26-Vereinbarung
thumbnail

Auf europäischer Ebene nimmt die Figur der gemeinsamen Verantwortlichkeit (Art. 26 DSGVO) durch die Rechtsprechung des Europäischen Gerichtshofs aktuell eine wichtige Rolle ein. Nationale Gerichtse…

An Ansible Tutorial | Servers for Hackers
thumbnail

Ansible is one of the simplest server provisioning and configuration management tools. This is a guide to getting started with Ansible.

A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic | Daniel Miessler
thumbnail

50 tcpdump examples that get you maximum results in minimum time. Slice by IP, port, protocol, and application!

Two-Factor Authentication
TikTok — Using OSINT to Discover New Leads | by AccessOSINT | Medium
thumbnail

TikTok has been with us for a couple of years now but we haven’t seen people using it in their investigations much until now. The mobile app allows users to make their own short videos. Lots of…

Pentesting tools | theyknow
thumbnail

This page will be a completely chaotic list of tools, articles, and resources I use regularly in Pentesting and CTF situations. My goal is to update this list as often as possible with examples, articles, and useful tips. It will serve as a reference for myself when I forget things and hopefully help other to discover tools that they haven’t used. If you know of more tools or find a mistake, please contact me on Twitter or by email (links above).

Practical Python Programming | practical-python

Practical Python Programming (course by @dabeaz)

Things I learned after rooting 25+ Hack the Box machines!
Webcam Hacking - Technical Walkthrough | Ryan Pickren
thumbnail

Techincal walkthrough

Enigma/Paper Enigma - Franklin Heath Ltd Wiki
Wireless Penetration Tips. A list for all things wireless that you… | by Adam Toscher | Medium
thumbnail

A list for all things wireless that you may find useful while assessing a real world Wi-Fi Enterprise Network. How-to: Evil Twin, KARMA, MANA, EAP-GTC Downgrade, passivity perform wireless recon…

Google Analytics rechtssicher einsetzen
10 Best OSINT Tools for Penetration Testing (Updated)
thumbnail

OSINT Tools are used by Pentesters to find possible vulnerabilities in the network. Here the Top 10 Best Open Source Intelligence Tools Available in GitHub.