Skip to main content
Hirusha Adikari
Student interested in Tech
View all authors

Metasploit - Beginner's Guide! What you need to know to get started! (INCOMPLETE!)

· 6 min read
Hirusha Adikari
Student interested in Tech

If you are just getting into the field of cyber security, you will quickly notice this one tool called "Metasploit" popping up everywhere. Metasploit a very popular tool among penetration testers, and is developed by Rapid7. In fact, learning the basics of Metasploit is considered so important, that Rapid7 even made their own vulnerable virtual machine called Metasploitable for students to learn and play around with. If you were to look for books about Metasploit, you will easily be able to find hundreds... Among these, the Metasploit Cookbook (Amazon, PDF) is an excelled resource and is something that I can recommend personally.

With all the "snake oil" hype surrounding metasploit, it can be hard to know where to begin from and this article is to guide you through the basic, common concepts and to help you get up and running.

Also, at the very end, I'll share a hot take about Metasploit - one that many will probably agree with, but some definitely won't.

alt text

How to Disable Password Policy in the Calamares Installer on Debian Live

· 2 min read
Hirusha Adikari
Student interested in Tech

For those who don't find the default Debian installer ("d-i") frustrating, you also have the option to install Debian using the Calamares installer. Additionally, there's a lot to configure post-install. To avoid all of this trouble, you can use the Debian Live installer, which uses Calamares.

By default, Calamares configuration in Debian Live enforces some password policies to prevent users from entering weak passwords. This is a very important feature, but I find it too complicated for virtual machines and testing scenarios. Therefore, in this article, let's see how to disable it and use a simple password.

alt text

Basic Server Hardening Guide

· 13 min read
Hirusha Adikari
Student interested in Tech

If you don't like big tech companies prying their eyes on your data, you might want to self host all the services either locally on-premise or on a cloud server (a Virtual Private Server or a Dedicated Server).

When you are doing this, yes, you are safe from the eyes of big tech, and you actually get to have some privacy. HOWEVER, you will be in charge of your own data security. Therefore, hardening your server is essential to keep your data secure from bad actors and sometimes even automated scanners.

In this article, let's see how to do just that. This guide focuses on Debian 12 (not Ubuntu, since it's Canonical's bloat). Let's get started.

How to install Windows apps without Microsoft Store?

· 4 min read
Hirusha Adikari
Student interested in Tech

If you are a Windows LTSC user, you don't have Microsoft Store to installation applications. Most applications can be installed separately without an issue. However, apps like WhatsApp Desktop requires you to install them via the store.

In this tutorial, let's see how to install apps that are only available in microsoft store without store.

Shared home folders!

· 5 min read
Hirusha Adikari
Student interested in Tech

Whether you are setting up a computer for yourself or someone else, it's always better to have the user's files on a separate disk (or at least a partition) for easy recovery and management. Doing this also allows directories (like Desktop) to be shared among multiple operating systems if you dual boot.

alt text

Alleged Data Breach of Abans Group (Sri Lanka)

· 2 min read
Hirusha Adikari
Student interested in Tech

A threat actor on a popular dark web forum has leaked the personal data of approximately 110,000 users of the Abans Group in Sri Lanka. Abans PLC, also known as Abans Group, is a Sri Lankan public limited company and a diversified conglomerate engaged in ICT, retail, manufacturing, logistics, commercial real estate, and financial services.

Autostart Services with Systemd in Linux

· 3 min read
Hirusha Adikari
Student interested in Tech

Automating the startup of services in Linux is crucial for ensuring system reliability and reducing manual intervention. In this guide, you'll learn how to use systemd to create and manage a service that starts automatically on boot. We'll cover setting up a dedicated user for security, creating a service file, enabling the service, and troubleshooting common issues.

alt text