Adrian Puente Z.
Subscribe
Visitors
Buy me a coffee!
If you like the information I share consider donating to maintain this blog online.
Categories
- Articles (9)
- Capture the Flag (1)
- Code (10)
- Conferences (2)
- Databases (1)
- DevOps (1)
- Docker (2)
- Events (4)
- Experiences and Stories (11)
- Exploits (1)
- Hacking (13)
- HackTwitts (9)
- Inphographic (2)
- Phishing (1)
- Postgres (1)
- Presentations (3)
- Random (1)
- Security (20)
Tags
- arturo garcia
- backtrack
- best practices
- born2pwn
- bugcon
- c4an
- comunidad underground
- Conferencias
- ctf
- cum
- Data Protector
- David Llorens
- elprofeseguro
- exploit
- fdisk
- hackarandas
- hacker
- hacking
- hakim
- hkm
- hpux
- indetectable
- infographic
- infosec
- ksh
- malware
- metasploit
- nitrous
- patch
- pentest
- poem
- privilege_escallation
- random
- remote shell
- remote_exec
- root
- security
- seguridad
- seguridad informatica
- spam
- SSH
- undetectable
- unix
- update
- wordpress
Archives
- April 2020 (1)
- March 2020 (2)
- August 2011 (1)
- March 2011 (1)
- November 2010 (1)
- October 2010 (1)
- August 2010 (3)
- June 2010 (5)
- May 2010 (3)
- April 2010 (4)
- March 2010 (2)
- January 2010 (1)
- October 2009 (1)
- April 2009 (2)
- June 2008 (1)
- May 2008 (1)
- April 2007 (3)
- March 2007 (2)
- February 2007 (6)
- January 2007 (3)
License
Hackarandas - Where the ideas disperse in bytes... by Adrián Puente Z. has the following license: Attribution-NonCommercial-ShareAlike 4.0 International
Category Archives: Code
Secure by Default Postgres Docker Container for Development
In this post I will explain how to provide a secure postgres server docker container. This is useful when developing certain applications, for example a Django application. You can only run a this script and it will automatically detect if … Continue reading
Hacking Docker Remotely
The following is a write up for a challenge given during a Docker security workshop in the company I work for. It was a lot of fun and ironically I managed to complete the challenge not exactly how they were … Continue reading
Posted in Capture the Flag, Code, Docker, Hacking
Tagged ctf, docker, hacking, privilege_escallation, remote_exec
Leave a comment
Updating your WordPress Blog in a blink!
I know, I know… WordPress already has an option to update your blog with one click… but I love to use my SSH and I don’t trust FTP connections, so here is my manual solution for this. I hope you … Continue reading
Can I reach it? Small Script for Network Connectivity Test
I made this script so I can replicate a network connection test to some host. It’s really small but it works in all the cases and has some nice features as internal and external IP detection. It works in Linux, … Continue reading
Posted in Code, Security
Tagged hackarandas, hacking, nmap, ping, seguridad, seguridad informatica, traceroute
1 Comment
Uncomplicated File Wipe for *NIX
We needed to guarantee to one of our customers that a file will be securely deleted. Since the server was a HPUX Unix and we can’t compile nor install new applications, I managed to write this script to wipe the … Continue reading
Posted in Code, Hacking, Security
Tagged hackarandas, ksh, secure delete, seguridad, seguridad informatica, unix, wipe
Leave a comment
Fast MAC Address Changer in Linux
When you are making a pentest sometimes you need to be sneaky and have some tricks in your arsenal to cloak yourself in the network. But some sysadmins are skillfull in their incident response and, sometimes (not many in my … Continue reading
Posted in Code, Hacking, Security
Tagged backtrack, bash, hackarandas, hacking, pentest
Leave a comment
Habemus GalerÃa
Pues ya por fin pude crear la galerÃa y es que querÃa ponerla de cierta forma en particular, ya saben, soy de esos que si no cuestan uno y la mitad del otro no me sabe. QuerÃa poner la galerÃa … Continue reading
Posted in Articles, Code
Leave a comment
Hex 2 ASCII y viceversa
He estado jugando un poco con redes inalámbricas y cuando logras romper alguna de 64 bits la llave te sale en Hexadecimal. Se me ocurrió que a lo mejor podrÃa significar algo en ASCII asi que pensé en hacerme un … Continue reading
Posted in Code
2 Comments
La chinche del FTP.
Imaginemos que eres sysadmin de una empresa con una red clase B, tus becarios están en exámenes finales, te acaba de llegar una notificación de la BSA amenazándote de una auditorÃa de software y encima es cierre y contabilidad te … Continue reading
Posted in Code, Security
Leave a comment