GDB hook .gdbinit

Categories: Security, tech

GDB hook that helps without third-party apps set disassembly-flavor intel define hook-stop info register eax info register ebx info register ecx info register edx info register ebp info register esp info register edi info register eip echo OPCODE ->\r\n x/10i $pc echo ESP ->\r\n x/16w $esp echo EBP ->\r\n x/16w $ebp end

Run MySQL Cluster Multi Masters For High Availability

Categories: Databases, Linux, tech

Hello Folks, it’s has been a while I didn’t write new articles, it’s has been a while I didn’t write new articles, so time to give back to the community, I will describe how to implement MySQL cluster for high-availability and disturbed workload MySQL Cluster Architect comes with new process ndbd and ndb_mgmd ndb is used … Read More

Linux Performance Co-Pilot with WebUI

Categories: Linux, tech

Performance Co-Pilot allow sysadmins to collect and measure data from various systems, it comes in RPM packages for Red Hat 6 to 7 website http://pcp.io/ installing Performance CO-Pilot yum -y install pcp pcp  packages comes with different services pmcd,pmlogger  pmcd  : performance metrics collector daemon [root@localhost ~]# systemctl enable pmcd ; systemctl start pmcd ; systemctl … Read More

Facebook Mass Invite to Like script

Categories: tech, Web

today I wrote  a script to help in sending an invitation to like your page this happens when you promote a post for your audience and they interact with your post but they forget to like your page so this script will help you to mass invite them in once 1 – click on the … Read More

Docker Persistent Storage for MySQL Server and SELinux

Categories: Databases, tech

hello everyone today we will make MySQL Docker Container with Shared Storage first let’s pull latest MySQL  version of docker docker pull mysql after we did download the latest image this image come in handy with some awesome parameters MYSQL_ROOT_PASSWORD MYSQL_DATABASE with this  parameters, we can create a database and set root password for mysql now let’s … Read More

Protect Boot & Single user mode

Categories: Linux, Security, tech

as a physical security is the main factor in our security perspective we all need to protect unauthorised access to our Linux box after we protect bios and we all know that anyone can rest the root password via accessing the single mode so we have 3 ways 1st thing to disable single user mode entirely … Read More

SSH Tunnelling

Categories: Linux, tech

the most famous method is using D parameter in ssh connection to bind a port local in your machine and this port tunnel back to our remote box to send our traffic to this server example ssh -D 1337 root@remotebox then you can configure your application and browser to use your local IP 127.0.0.1 with … Read More

Secure/Lock accounts with PAM tally2

Categories: Linux, Security, tech

pam_tally2 is a PAM module to allow interaction in users interfaces on numbers of failed login attempt it can reset count on success, can deny access if too many attempts fail. this module is unique because it  not just reflect remote connection but also reflect the ttys and any system login method as it uses PAM example … Read More

password policy with pam_cracklib

Categories: Linux, Security, tech

cracklib pam module is a method to check the password against dictionary list and gives you availability to check the strength of the password and set rules to identify the poor passwords   here is the most important parameters for this module  minlen minimal password length dcredit maximum number of digits ucredit maximum uppercase letters … Read More