Category: Uncategorised

  • Compliance Benchmark with Jamf

    As I finished Jamf 100, I started my journey towards Jamf 170 and hopefully Jamf 200 which I am asking my IT job to pay for me. Before I go to the topic, I would like to briefly recap what I learned in Jamf 100. The first section was a general and basic overview of…

    Continue Reading

  • Changing Plist files with Defaults Command In Mac

    While preparing for series of Jamf certifications I stumbled upon .plist files in Mac which show preferences of system or a specific user. I thought it would be interesting to play around with them and see how system preferences reflect on all users and how to twinkle preferences via terminal. Changing such settings via terminal…

    Continue Reading

  • Python Blackjack Game

    Python Blackjack Game

    Hello everyone! This post is dedicated to creating a blackjack card game in Python programming language. I started by creating classes card.py, player.py, and deck.py. There are comments in the code to help you to understand the code. I am assuming the reader knows the rules of the Blackjack game. If not, please familiarize yourself…

    Continue Reading

  • Soccer Enumeration And Exploitation

    Soccer Enumeration And Exploitation

    Hello everyone! This post is about enumerating and exploiting Soccer. No, not a soccer game, but a machine. Soccer is one of the retired machines on Hack the Box, it is a Linux machine with a web vulnerability. Let’s get into it! First things first, I should run Nmap (or a similar tool) against the…

    Continue Reading

  • Active Directory Scenario

    Active Directory Scenario

    Hello dear readers. In this post, I would like to implement the following scenario in Microsoft Active Directory. Scenario: I am building a small domain for the Small Book Company, a small bookstore that wishes to have an Active Directory management system to tie together the six computers used as point-of-sale and inventory look-up, research,…

    Continue Reading

  • Nibbles Enumeration And Exploitation

    Nibbles Enumeration And Exploitation

    Hello Everyone! This is my first post on my website, and I would like to dedicate it to the Nibbles machine.  Nibbles is an old machine from Hack The Box, and the purpose is to obtain root. This is just a capture-the-flag machine with serious vulnerabilities. Let us start by looking at machine statistics. Machine…

    Continue Reading