envsubst – Substitute Variables for Environment Variables

Hi 👋, Introduction In this short article I want to showcase a nice and useful Linux command. The comand 🥁 envsubst 🥁. In short it Substitutes the values of environment variables. It’s great for populating configuration files with values from environment variables, a common operation for developers containerizing their applications. Example Usecase Let’s say we are containerizing an application and we have the following file configuration.yaml, and we want to modify the values of the environment field and the log_level field without adding the additional complexity of mounting the configuration.yaml file into the container/pod. ...

October 23, 2022 · 2 min · Denis Nuțiu

Multi Touch Gestures on Linux

Hello, I’ve been using Linux full time on my work laptop and one thing that I really miss from the Macbook is the multi touch gestures. I often find myself swiping 3 fingers up the trackpad to see all my open applications and nothing happens, bummer. Then, I came across Fusuma, a great project which aims to bring multi touch gesture support to Linux laptops! It won’t give you an Apple like experience but it’s okay-ish. I can finally swipe three fingers up to show all my open applications and three fingers left or right to switch between my gnome workspaces, and it comes with some plugins which allow you to create a personalized touchpad experience, for example, tap 3 fingers at the same time and shutdown the computer. ¯\_(ツ)_/¯ ...

May 3, 2020 · 1 min · Denis Nuțiu

Root-Me: ELF C++ – 0 protection solution

Hello! My daily work is doing full stack web development, and reversing is a side thing that I do for fun and in my free time. In this article I will show you an easy way to solve for ELF C++ – 0 protection challenge, which can be found on https://www.root-me.org under the cracking section. I found this challenge a bit difficult mostly because I’m not used to reverse C++ code but, since it doesn’t contain any protection at all, all you need to do is to inspect the parameters. ...

August 12, 2019 · 2 min · Denis Nuțiu

Root Me: ELF-CrackPass with Ghidra

Hello! I’ve been playing recently a bit with Ghidra, which is a reverse engineering tool that was recently open sourced by the NSA. The official website describes the tool as: A software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission I’m at the beginning of my reverse engineering career, I didn’t do anything advanced and I don’t know what features to expect from a professional tool like this, if you’re looking to read about advanced Ghidra features them I’m sorry. :/ ...

March 9, 2019 · 8 min · Denis Nuțiu