Installing Gentoo on VMware workstation 16

First of all…

I got peer pressured into this, I am not doing this out of free will!  Just kidding, in this blog post I will summerize my first journey with Gentoo and how to set it up inside a VM with VMware workstation version 16.  This guide will help you setup a virtual instance of Gentoo and i suggest that you read carefully the Gentoo Handbook to understand what we are going to do here in great detail.

Read more “Installing Gentoo on VMware workstation 16”

How-to monitor your windows machine with splunk

Why use Splunk?

Using Splunk to monitor your computer or vps is free, easy and let you learn about one of the best SIEM tool available on the market (as for now 2022).  In this post I will share some of my personal Splunk configurations and alerts so you can start monitoring what is going on in your windows machine and maybe see things you didn’t before.  So let’s start shall we!

Read more “How-to monitor your windows machine with splunk”

Testing kali linux on windows 10 with WSL

Second try :
Kali can be found directly on the windows store. This version is much more stable than the one i tried to patch from ubuntu with the git repo in my first try.

Some usefull tweeks can be found here :

Everything is working well for now.

Edit 1 )
To make nmap work, install it on windows and make an alias :

alias nmap='"/mnt/c/Program Files (x86)/Nmap/nmap.exe"'


This version is not stable.

WSL stand for windows subsystem for linux

its a kindof native port for linux inside windows. not like emulation, it share the ressources directly from windows to run linux binaries.

To repare fuckedup things at first do those :

To fix error of expired cert. when trying to use apt-get command just do this :

apt install ./kali-archive-keyring_2018.1_all.deb
apt-get update

To fix error when you are not able to resolve address (aka dns is fuckedup)
just edit /etc/resolv.conf and add your favorite dns aka or

after do an apt update && apt upgrade


Kali Linux on Windows Subsystem for Linux

Way to find clues inside a ctf box

we find a file that was created by the maker in the process of creation ie : flag.txt.

Flag.txt was created 22 august 2017

find / -type f -newermt 2017-08-20 ! -newermt 2017-08-24 -ls 2>/dev/null

We see all files that have changed between 20-08 and 24-08 (if needed we can change the range)

With that we can see interesting changes inside the boxes

A journey into Windows pentesting.

I did root many windows rig in the last week.  You can practice your skill too, just go to  Here i will not tell you how specificity root those vulnerable windows os, i just want to keep some of the basics that i learned from this.

As expected the info gathering is the same nmap nikto dirb etc.

The windows command line, as i am used to unix bash this command line was like Korean to me.

Here are the basic commands that are useful : Read more “A journey into Windows pentesting.”

CTF Sedna from Viper (hackfest 2016)

Hi everyone, I did the first Vuln VM from hackfest 2016 not long ago and i want to try this one now. It’s the second one by @ViperBlackSkull and it is the second walkthrough for me so if you need more information you can reach me on twitter at @marghost.  You can get the virtual machine HERE. So lets get started.

Read more “CTF Sedna from Viper (hackfest 2016)”