Vulnerability scanners are useful tools for administrators and security analysts alike. For the casual WordPress user tools like WPScan may look excessive and complicated for their knowledge, they just need their blog, web page, whatever they’re doing up and running. Any complex administration bothers them to the max, and there are good and valid reasons […]

How to find vulnerabilities in your WordPress with WPScan

How to upgrade FreeBSD from version 11.2 up to 12.0
Although the upgrade process is very well described on the FreeBSD handbook you may be looking for a more detailed hands on how to upgrade FreeBSD from version 11.2 up to 12.0 article. We’re going work here on this process, step by step detailing not only how to upgrade but to do it safely. First […]

How to mitigate Spectre and Meltdown on a Lenovo T430s laptop with Ubuntu
As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have your systems patched and if they aren’t for whatever the reason (that legacy thing […]

ARP spoofing attacks
ARP spoofing attacks are quite harming and they can easily constitute a man-in-the-middle (MITM) attack. They consist on the attacker sending ARP packets into the network the victim is located, typically redirecting traffic to the attacker’s machine. Once this is achieved the attacker can sniff all the traffic sent by the victim’s device and obtain […]

What is Expect?
Expect is a handy scripting tool for task automation. You may have never heard of it. I heard about many scripting things before. But one day I needed something simple but didn’t know how to proceed, what would be a good tool for my purpose. The task was simple. Exporting a website content from a […]

How to set the locale in FreeBSD
The locale is the character set that will be used. And it is very important to match the keyboard you are using. Mind this also matters if you are transferring data to other systems. Different standards as the ASCII, UTF’s and the ISO’s, to name a few, have been put in place through the years […]

How to analyze suspicious email
Millions of emails are sent and received every day. Most of them are just junk. And many among those are potentially harmful. Phishing still is one of the most effective ways for malicious actors to penetrate into well secured networks. The weakest link, too often, is the human factor. Training can help mitigate this 24×7 […]

How to mitigate Spectre and Meltdown on an HP Proliant server with FreeBSD
As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have your systems patched and if they aren’t for whatever the reason (that legacy thing […]

How to configure TLS 1.2 on UNIX or GNU/Linux
This is an article willing to help and point out a few useful resources for those using Apache HTTP or NGINX web servers that are still using the deprecated SSLv3, TLS 1.0 and/or TLS 1.1 verions. If you find the articles in Adminbyaccident.com useful to you, please consider making a donation. Use this link to […]

How to upload a FreeBSD custom image on DigitalOcean
Due to DigitalOcean not releasing ready to use images for FreeBSD 13 at this time, and since I opened a ticket a couple of months ago without a strong positive message from DigitalOcean supporting FreeBSD 13, I’ve decided to make use of their custom image upload service and give it a go. I must say […]