- Tweak HCL Connections Newsletter v2
- Repair Administration Console of Connections 7 for Chromium-based Browsers
- Upload Files via IBM HTTPServer (mod_ibm_upload) to HCL Connections
- HCL Connections Newsletter v2 and Join Community requests
- Show Community Create Button only to users with role "community-creator"
- Makefile to process all Asciidoctor files in a directory
- Update on the Touchpoint workaround (Updated)
- Linkdump Week 44 / 2020
- Linkdump Week 42 / 2020
- Linkdump Week 41 / 2020
Download and Informations Link to Vulnhub DC Challenges Original Description DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn. To successfully complete this challenge, you will require Linux skills, familiarity with the Linux command line and experience with basic penetration testing tools, such as the tools that can be found on Kali Linux, or Parrot Security OS.
Downloads and Informations djinn:1 is the next machine I want to break in. Description on Vulnhub Level: Beginner-Intermediate flags: user.txt and root.txt Format: Virtual Machine (Virtualbox - OVA) Operating System: Linux The machine is VirtualBox as well as VMWare compatible. The DHCP will assign an IP automatically. You’ll see the IP right on the login screen. You have to find and read two flags (user and root) which is present in user.txt and root.txt respectively. Recon Djinn shows its actual IP address on the login prompt, so there is no need to run nmap -sn or netdiscover.