Skip to content

Jitendra Patro

It's only "not easy" until you learn how.

Menu
  • Home
  • Blog
  • Projects
  • Writeups
    • Advisories
      • CVE writeups
      • Not CVE writeups
    • Android
    • Radio/Satellite Hacks
    • Secure Code Warrior
      • PHP Basic
    • HW Hacks

Category: Tutorials

This category is for the guides and tutorials made by me.

Posted onJune 5, 2023June 7, 2023Android

OWASP Android UnCrackable Level 2

by PhoenixLeave a comment on OWASP Android UnCrackable Level 2

This is my second blog post related to Android Security. I recommend reading my first blog post in this category to understand some of the concepts I’m going to use…

Read More
Posted onMay 24, 2023June 5, 2023Android

OWASP Android UnCrackable Level 1

by PhoenixLeave a comment on OWASP Android UnCrackable Level 1

This is my first blog post related to Android Security. Today, I’ll be writing about two different solutions to solve the OWASP Uncrackable Level 1 Android app. For the first…

Read More
Posted onMarch 8, 2023April 1, 2023HW Hacks

Emulating AARCH64(ARM64) with QEMU – Part 1

by Phoenix2 Comments on Emulating AARCH64(ARM64) with QEMU – Part 1

Introduction Whether you’re trying to build/test software for different architectures, or doing reverse engineering/hardware hacking, you’ll often come across the need to possess a build/hacking environment for a different architecture…

Read More
Posted onJanuary 20, 2023April 6, 2023ModSecurity

ModSecurity with OWASP CRS – Part 1: Installation

by PhoenixLeave a comment on ModSecurity with OWASP CRS – Part 1: Installation

ModSecurity is an open source, cross platform Web Application Firewall (WAF) developed by Trustwave’s SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks…

Read More
Posted onJune 27, 2022May 11, 2023Tutorials

Deploying a Shadowsocks Server to GCP using Terraform

by PhoenixLeave a comment on Deploying a Shadowsocks Server to GCP using Terraform

Introduction Terraform is the most popular Infrastructure as code (IaC) tool available in the market. It supports more than a 1000 cloud providers and has some serious documentation for getting…

Read More
Posted onMarch 21, 2022February 3, 2023Tutorials

Installing Vaultwarden server with Apache and SSLH proxy

by Phoenix2 Comments on Installing Vaultwarden server with Apache and SSLH proxy

Introduction Vaultwarden is a lightweight, single-process, rust based alternate implementation of the Bitwarden Server API which is compatible with bitwarden password manager clients. In short, Vaultwarden is an open source…

Read More
Posted onMarch 20, 2022June 1, 2023Tutorials

Migrating Rootful Docker containers to Rootless Docker

by PhoenixLeave a comment on Migrating Rootful Docker containers to Rootless Docker

Introduction Rootless mode of docker allows a non-root user to run Docker daemon and containers. This helps in preventing potential vulnerabilities, like privilege escalation to root, in the Docker daemon…

Read More
Posted onFebruary 28, 2022January 20, 2023Tutorials

Setting up a send-only mail server with Postfix

by PhoenixLeave a comment on Setting up a send-only mail server with Postfix

Introduction As I’ve mentioned in my First Blog Post, setting up a mail server is optional but recommended to monitor events and security incidents in our server. In this article,…

Read More
Posted onJanuary 28, 2022August 20, 2022Tutorials

Configuring Two Factor Authentication for ‘su’ and ‘sudo’

by PhoenixLeave a comment on Configuring Two Factor Authentication for ‘su’ and ‘sudo’

Linux security is a constantly evolving topic. One of the biggest security related headaches for Administrators is granting Sudo privileges to users. Sudo privilege when unchecked can become the primary…

Read More
Posted onDecember 31, 2021December 9, 2022Tutorials

Security Tips for Apache Webserver

by PhoenixLeave a comment on Security Tips for Apache Webserver

Apache was the most popular open source webserver available for Linux until recently. As of writing this Apache is used by 31.3% of all websites according to W3Techs. In the…

Read More

Posts pagination

Page 1 Page 2 Next Page

About The Blog

I created this blog to share the knowledge I've gained over the years and things that I'm yet to learn. Presently, my posts will be mainly focused on Open Source software, Information Security and Hacking. Happy Learning!

Recent Posts

  • OWASP Android UnCrackable Level 2
  • OWASP Android UnCrackable Level 1
  • Project: Wireless Hacks!
  • Emulating AARCH64(ARM64) with QEMU – Part 1
  • ModSecurity with OWASP CRS – Part 1: Installation
  • CVE-2022-33012:- Account Takeover Through Password Reset Poisoning
  • CVE-2022-33994:- Stored XSS in WordPress

Archives

  • 2023
  • 2022
  • 2021

Categories

  • Advisories
  • Android
  • CVE writeups
  • HW Hacks
  • ModSecurity
  • Not CVE writeups
  • PHP Basic
  • Projects
  • Radio/Satellite Hacks
  • Secure Code Warrior
  • Tutorials
  • Writeups

Tags

aarch64 access control Account Takeover algorithm Android apache Azure Bitwarden C CMS code Core Rule Set CVE Debian dns docker Email emulation first post Frida gcloud cli git Google Cloud HCL HTTP Headers IDOR injection installing-openvpn-as iptables Java JavaScript Linode Linux mail MFA Microsxxt MITRE MobSF mysql Networking nextcloud Open Source openvpn OpenVPN 3 ovpn-dco OWASP pagespeed password manager path traversal performance php php-fpm postfix Project proxy QEMU Radio restricting-ssh rootless docker securing-ssh Security security misconfig sensitive data exposure Shadowsocks SMIL sql ssh ssl sslh sslh-proxy su sudo SVG Terraform transparent-sslh two-factor-auth ubuntu virtualization vulnerability WAF webserver WordPress XSS

Contact Me

  • GitHub
  • LinkedIn
  • Mail
  • GitHub
© 2024 Jitendra Patro.