8 de maio de 2017

Penetration Testing Books

The Art of Exploitation by Jon Erickson, 2008 Metasploit: The Penetration Tester’s Guide by David Kennedy and others, 2011 Penetration Testing: A Hands-On Introduction to Hacking […]
8 de maio de 2017

Testing TLS/SSL encryption

testssl.sh is a free command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as recent […]
8 de maio de 2017

Install Powerline shell on osx

Step 1 [crayon-59c11804cffbf895187596/] [crayon-59c11804cffc6689339470/] [crayon-59c11804cffc8451824264/] [crayon-59c11804cffca402609583/] Step 2 [crayon-59c11804cffcb587478006/] [crayon-59c11804cffcd994094255/] [crayon-59c11804cffce664902094/] Step 3 [crayon-59c11804cffd0253680118/]
8 de maio de 2017

Pentest – PHP Reverse Shell

This scripts was designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Step 1 Upload this script […]
8 de maio de 2017

Infraestrutura como Código

Administradores de sistemas vivem utilizando scripts e ferramentas para a realização de rotinas e tarefas de infra, para o gerenciamento de ambientes por décadas. Mas a […]
8 de maio de 2017

Deploy Testlink with Chef Solo

HowTo https://github.com/richardsonlima/hashId-Chef-LAMP-TestLink   Cookbook install and configure: Apache2 + PHP5 + MySQL5 + Testlink Open Source Test Management – http://testlink.org Test: Ubuntu Server 14.04.4 LTS Database […]
8 de maio de 2017

Run OCS Inventory NG server in Docker

Docker install Step 1: Installation of Docker [crayon-59c11804b58c1021053633/] Step 2: Start Docker and Make Sure Docker Starts on Boot [crayon-59c11804b58ca942136576/] [crayon-59c11804b58cd777990510/] [crayon-59c11804b58cf030282941/] Step 3: Pulling our […]
16 de março de 2017

Infraestrutura hiperconvergente

Lorem ipsum dolor sit amet enim. Etiam ullamcorperlentesque dui non felis.
16 de março de 2017

Os benefícios do movimento dos micro serviços e conteinerização

Quisque lorem tortor fringilla sed, vestibulum id, eleifend justo vella ipsum dolor lacus, suscipit adipiscing. Cum sociis natoque penatibus et ultrices volutpat.
6 de março de 2017

Segurança e Docker containers

Nunc felis. Curabitur ac ipsum. Pellentesque nibh ultricies est. Maecenas consequat, augue a venenatis risus. Ut id mollis vel, lacinia quam. Praesent blandit malesuada. Suspendisse commodo

7 de dezembro de 2016

Ataque e Defesa: Linux Privilege Escalation

Quisque lorem tortor fringilla sed, vestibulum id, eleifend justo vella ipsum dolor lacus, suscipit adipiscing. Cum sociis natoque penatibus et ultrices volutpat.
Clef two-factor authentication