Category: Uncategorised
-
Compliance Benchmark with Jamf
As I finished Jamf 100, I started my journey towards Jamf 170 and hopefully Jamf 200 which I am asking my IT job to pay for me. Before I go to the topic, I would like to briefly recap what I learned in Jamf 100. The first section was a general and basic overview of…
-
Changing Plist files with Defaults Command In Mac
While preparing for series of Jamf certifications I stumbled upon .plist files in Mac which show preferences of system or a specific user. I thought it would be interesting to play around with them and see how system preferences reflect on all users and how to twinkle preferences via terminal. Changing such settings via terminal…
-
Python Blackjack Game

Hello everyone! This post is dedicated to creating a blackjack card game in Python programming language. I started by creating classes card.py, player.py, and deck.py. There are comments in the code to help you to understand the code. I am assuming the reader knows the rules of the Blackjack game. If not, please familiarize yourself…
-
Soccer Enumeration And Exploitation

Hello everyone! This post is about enumerating and exploiting Soccer. No, not a soccer game, but a machine. Soccer is one of the retired machines on Hack the Box, it is a Linux machine with a web vulnerability. Let’s get into it! First things first, I should run Nmap (or a similar tool) against the…
-
Active Directory Scenario

Hello dear readers. In this post, I would like to implement the following scenario in Microsoft Active Directory. Scenario: I am building a small domain for the Small Book Company, a small bookstore that wishes to have an Active Directory management system to tie together the six computers used as point-of-sale and inventory look-up, research,…
-
Nibbles Enumeration And Exploitation

Hello Everyone! This is my first post on my website, and I would like to dedicate it to the Nibbles machine. Nibbles is an old machine from Hack The Box, and the purpose is to obtain root. This is just a capture-the-flag machine with serious vulnerabilities. Let us start by looking at machine statistics. Machine…