7 posts tagged with "Linux"


My last post was about Building a retro gaming machine in a day- where I got a Raspberry Pi 4, a PS4 controller, and installed RetroPie. It was a blast to play some SNES, PS1, and Amiga games. But like usual, I seem to have more fun tinkering with these things than playing games for hours on end… I recently stumbled on an interesting project called re3 - a reverse engineering project of the original Grand Theft Auto 3. After a little reading, I discovered the project had excellent Linux support…

I have wanted a retro gaming setup for about 10 years! I have dabbled with a little emulation of older consoles from my childhood - things like Sega Mastersystem, Playstation 1, and Amiga 500 emulation. In the past, I just set up an emulator on my Linux laptop (Thinkpad BTW) played around a little, tweaked some settings, then got bored. The problem was I wanted more games, more emulators for different platforms, and a proper controller instead of a keyboard/mouse. However, the biggest thing I…

This post summarizes a simple method to secure, or lock-down, SSH access using the Restricted SSH () package. The basic premise, you can create a user with a restricted shell and allow only specific protocols such as SCP or SFTP. There are many reasons to restrict SSH access or restrict SSH access to specific accounts. I used on an assessment server in one of the papers I teach. I wanted students to be able to submit an assessment using a simple bash script, that SCP transferred a single file…

This post documents how to build a Linux gateway using Ubuntu Server 18.04. The gateway connects an internal network to an external network - basically, performing Network Address Translation (NAT) for hosts on the internal network. It is exceptionally similar to what your ISP supplied home router does. To achieve this, an Ubuntu Linux server is configured as a DHCP server and also to provide NAT using . Contents Introduction Configure Network Interface Cards Install DHCP server Configure…

This post is part of a series on the Ubuntu Linux version of Metasploitable3. The following posts are part of the series: Part 1: Building the Ubuntu Linux Version Part 2: Customizing the Ubuntu Linux Version (You are here!) Part 3: Pentesting the Ubuntu Linux Version - SQL Injection Part 4: Pentesting the Ubuntu Linux Version - Attacking Services Contents Introduction Cleaning the Build Environment Remove the Virtual Machine from VirtualBox Removing the Previous Vagrant Box Customizing…

This post is part of a series on the Ubuntu Linux version of Metasploitable3. The following posts are part of the series: Part 1: Building the Ubuntu Linux Version (You are here!) Part 2: Customizing the Ubuntu Linux Version Part 3: Pentesting the Ubuntu Linux Version - SQL Injection Part 4: Pentesting the Ubuntu Linux Version - Attacking Services Contents Introduction Metasploitable2, Metasploitable3 and InfoSec Assignments Building the Metasploitable3 Linux Version Install Application…

Contents Introduction How to Save All BASH History Additional BASH History Configuration BASH Configuration Overview A BASH Script to Configure Enhanced BASH History Introduction It is my continual venture to make my job easier. Like my sysadmin roots taught me, try to automate the process, and document thoroughly. In my job as a lecturer, I try to automate many aspects of the courses I run. Even though it takes time up front… next semester will be easier! I learned a lesson about using VMs for…