Adrian Puente Z.
Subscribe
Visitors
Buy me a coffee!
If you like the information I share consider donating to maintain this blog online.
Categories
- Articles (9)
- Capture the Flag (1)
- Code (10)
- Conferences (2)
- Databases (1)
- DevOps (1)
- Docker (2)
- Events (4)
- Experiences and Stories (11)
- Exploits (1)
- Hacking (13)
- HackTwitts (9)
- Inphographic (2)
- Phishing (1)
- Postgres (1)
- Presentations (3)
- Random (1)
- Security (20)
Tags
- arturo garcia
- backtrack
- best practices
- born2pwn
- bugcon
- c4an
- comunidad underground
- Conferencias
- ctf
- cum
- Data Protector
- David Llorens
- elprofeseguro
- exploit
- fdisk
- hackarandas
- hacker
- hacking
- hakim
- hkm
- hpux
- indetectable
- infographic
- infosec
- ksh
- malware
- metasploit
- nitrous
- patch
- pentest
- poem
- privilege_escallation
- random
- remote shell
- remote_exec
- root
- security
- seguridad
- seguridad informatica
- spam
- SSH
- undetectable
- unix
- update
- wordpress
Archives
- April 2020 (1)
- March 2020 (2)
- August 2011 (1)
- March 2011 (1)
- November 2010 (1)
- October 2010 (1)
- August 2010 (3)
- June 2010 (5)
- May 2010 (3)
- April 2010 (4)
- March 2010 (2)
- January 2010 (1)
- October 2009 (1)
- April 2009 (2)
- June 2008 (1)
- May 2008 (1)
- April 2007 (3)
- March 2007 (2)
- February 2007 (6)
- January 2007 (3)
License
Hackarandas - Where the ideas disperse in bytes... by Adrián Puente Z. has the following license: Attribution-NonCommercial-ShareAlike 4.0 International
Author Archives: ch0ks
Secure by Default Postgres Docker Container for Development
In this post I will explain how to provide a secure postgres server docker container. This is useful when developing certain applications, for example a Django application. You can only run a this script and it will automatically detect if … Continue reading
Hacking Docker Remotely
The following is a write up for a challenge given during a Docker security workshop in the company I work for. It was a lot of fun and ironically I managed to complete the challenge not exactly how they were … Continue reading
Posted in Capture the Flag, Code, Docker, Hacking
Tagged ctf, docker, hacking, privilege_escallation, remote_exec
Leave a comment
Updating your WordPress Blog in a blink!
I know, I know… WordPress already has an option to update your blog with one click… but I love to use my SSH and I don’t trust FTP connections, so here is my manual solution for this. I hope you … Continue reading
Reunión CUM 2010
Hace poco el buen Nitrous me comentó que se iba a armar una reunión del CUM (Comunidad Underground Mexico, no piensen mal) y despues el buen HKM autor del sitio Hakim me comentó que podÃa difundirlo. Bueno, les hago extensiva … Continue reading
Posted in Conferences, Events, Hacking
Tagged comunidad underground, cum, hackarandas, hacker, hacking, hakim, hkm, infosec, nitrous, security, seguridad, seguridad informatica
Leave a comment
Conferencia HUM – BugCon2010
Quiero invitarlos a mi conferencia de HUM – Homemade Undetectable Malware que voy a dar en la BugCon2010 este viernes 29 de octubre del 2010. Es parte de lo que dà en la conferencia del ITESM pero voy a agregarle … Continue reading
Posted in Conferences, Events, Hacking, Presentations, Security
Tagged bugcon, Conferencias, hackarandas, hacking, malware, seguridad, seguridad informatica
2 Comments
Can I reach it? Small Script for Network Connectivity Test
I made this script so I can replicate a network connection test to some host. It’s really small but it works in all the cases and has some nice features as internal and external IP detection. It works in Linux, … Continue reading
Posted in Code, Security
Tagged hackarandas, hacking, nmap, ping, seguridad, seguridad informatica, traceroute
1 Comment
Uncomplicated File Wipe for *NIX
We needed to guarantee to one of our customers that a file will be securely deleted. Since the server was a HPUX Unix and we can’t compile nor install new applications, I managed to write this script to wipe the … Continue reading
Posted in Code, Hacking, Security
Tagged hackarandas, ksh, secure delete, seguridad, seguridad informatica, unix, wipe
Leave a comment