Erwin Bierens

Knowledge is Power

Running PowerShell on your RaspberryPi

2018-12-06 1 min read Linux Powershell Erwin Bierens

For many years PowerShell was a Windows-only thing that was part of the closed Windows ecosystem. Now a days PowerShell is open source up at https://github.com/PowerShell with lots of docs and scripts, also open source.

PowerShell is supported on Windows, Mac, and a half-dozen Linux distros.

While running PowerShell on your RaspberryPi is still experimental and only supported for Raspbian Stretch it’s running pretty smoothly.

/

Installing

Install the prerequisites

	sudo apt-get install libunwind8

Grabbing the latest tar.gz

Continue reading

OpenVPN in Kali Linux

2016-04-30 2 min read Security Erwin Bierens

This how to describes how to configure Kali to use a openVPN for securing your traffic.

Why should u use VPN?

Here’s my top 5 why you want to use a VPN service.

  1. VPN provides Privacy and hides your own External IP address.
  2. Use any network (public or private or free (hotspot WiFi) with encryption.
  3. Login to your home or Work network from anywhere with confidence of encrypted traffic.
  4. Bypass censorship and content monitoring  by goverments.
  5. Browse and bypass Firewall and censorship policy from Anywhere!

As you can see from the list above, VPN not necessarily hides everything. Search engines  like google, bing and yahoo can still recognizes you based on your cookies or account sign-in. So make sure you use tools like Bleachbit (clear browsing data etc) and enable plugins in your browser for tracking and ads (privacy badger, uBlock Origin or Privacy.net analyzer).

Continue reading

How to install BeEF on Ubuntu

2016-04-26 2 min read Security Erwin Bierens

Beef BeEF stands for The Browser Exploitation Framework. It is a great penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, It looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. It will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.

Continue reading
Newer posts