The theft of credentials has been occurring since almost the beginning of time. But of course when the web ‘happened’ and specially when e-commerce exploded stealing passwords also went on the rise. Emptying bank accounts, ordering stuff on behalf (and expenses) of others, spying, even impersonation was and is achieved by stealing credentials. Luckily for […]

Web credentials stealing

How to mitigate Spectre and Meltdown on a Lenovo T430s laptop with Ubuntu
As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have your systems patched and if they aren’t for whatever the reason (that legacy thing […]

How to setup a simple firewall in FreeBSD using IPFW
Setting the firewall up is a mandatory task on any computer facing the internet. This is a simple, straightforward how to article on how to setup a box with an easy firewall configuration on FreeBSD. If you find the articles in Adminbyaccident.com useful to you, please consider making a donation. Use this link to get […]

Networking Dictionary
This is an attempt to collect all the necessary basic vocabulary to have a very basic basic understanding of networking. Because context is also needed, some concepts or historical references will be also shown. This dictionary is an informal one, for a better, accurate, more correct and in depth understanding look somewhere else, like the […]

Abandon Linux. Rolling back the entire OS is possible.
When I was writing an article on updating FreeBSD from the 11.2 version to the new major release number 12, I was trying to add something extra for those who may read some of the information I publish. FreeBSD as a UNIX operating system has similar functionality to the old school UNIX ones such as […]

How to manage site visitors based on IP Geolocation
Whenever someone publishes a website on the internet, most of the times, their intention is that site to be seen around the globe. However, as a site administrator you may want to divert users from one country to visit some specific version of that site, maybe because of the visitor’s language. Other times, less often […]

How to update FreeBSD using beadm
Beadm is a tool which provides a wonderful and distinctive functionality on Solaris, OpenIndiana and FreeBSD. It relies on the ZFS filesystem allowing to take a filesystem snapshot. That can be used to manage the so called boot environments which provide a great way to secure updates, even when everything goes down the tubes. Hence […]

Lynis or how to quickly audit your system’s security configuration
A colleague of mine pointed me out to Lynis, a system’s configuration audit tool which checks the hardening of any running UNIX or UNIX-like system, including the BSDs. This tool has a built in check list and a set of sane and safe configurations and compares them to the target system. As output we find […]

Exploiting CVE-2019-0708 Remote Desktop Protocol on Windows
The CVE-2019-0708 is the number assigned to a very dangerous vulnerability found in the RDP protocol in Windows sytems. This is also known as the ‘Blue Keep’ vulnerability. The issue was so critical that Microsoft did even release patches to unsupported operating systems such as Windows XP or Server 2003. To this day there are […]

VMWare ESXi (One)
The VMWare ESXi is a hypervisor developed by the VMWare company and it is widely known and used in many environments and enterprises of all sorts. Nowadays it is the main component of a sort of a software suite. It is a type one hypervisor which means it runs directly on to the hardware controlling […]
