Welcome @stoeps.de, the blog of Christoph Stoettner
I work at Vegard IT GmbH as a senior consultant with a focus on collaboration software, Kubernetes, security and automation. I mainly deal with HCL Connections, WebSphere Application Server, Kubernetes, Ansible, Terraform and Linux.
Sometimes my daily work results in technical talks and blog articles, which you can follow here more or less regularly. You can find the presentations in the main menu under public speaking .
I created a list of tools I use regularly, most of which have been released under an open source license.
In my spare time I read a lot, test all kinds of technical software and gadgets and try to follow about 200 RSS feeds.
Here you can find a collection of them.
This is my private blog, all opinions are my own.
Last created or modified articles
I started reviewing old blog post and replace links, or check if the information is still valid. So here are the last updated articles.
- CVE-2024-23557 - HCL Connections Security Update for User Enumeration Vulnerability · Created: 2024-04-21
- Talks 2024 · Updated: 2024-04-05 · Created: 2024-01-01
- Chemnitzer Linuxtage 2024 · Created: 2024-04-05
- Distrobox can't delete root container · Created: 2024-04-05
- Guten Rutsch! · Updated: 2024-04-05 · Created: 2006-12-31
I write most of my documentation with Asciidoctor , so saving some keystrokes is important.
You can add window=_blank
to links in your Asciidoctor source.
Last Update: Read in about 1 min
This week I attended the DNUG Connections Day 2020 in Munich . First of all I need to thank the organization team which did a really good job (Thanks Andreas , Martti and Lara ). During the short breaks we had great conversations with parts of the HCL Developer team and other attendees.
Update
I completely forgot to mention Jörg Rafflenbeul ! He was responsible for beer steins, a great glass of quits jar, photos, videos and a ton more. Sorry Joerg and thank you!
Last Update: Read in about 3 min
Original Description
DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
Last Update: Read in about 8 min
Original Description
Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
Last Update: Read in about 8 min
Original Description
DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
Last Update: Read in about 5 min
- djinn:1 is the next machine I want to break in.
- Level: Beginner-Intermediate
- flags: user.txt and root.txt
- Format: Virtual Machine (Virtualbox - OVA)
- Operating System: Linux
Last Update: Read in about 13 min