Encrypt your DNS queries, stay anonymous

We think that connecting to a website over HTTPS is secure, which is true(not true sometimes!), but what about DNS queries that you(browser) send? Sure if we use HTTPS, all your (POST or GET) data is encrypted end-to-end which prevents eavesdropping, MITM attack and have Confidentiality, but again what about DNS queries? I got this question back a while ago, so after a quick Internet search, I found DNSCrypt protocol which is cool because I can encrypt DNS queries. ...

January 22, 2018 · 3 min · Veerendra K

Wifi Deauthentication Attack

A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point. -Wikipedia As you can see, this type of attack is pretty powerful and difficult to detect who is attacking. There are some tools(like “aircrack-ng”) for this attack(You can check the commands here). So, basically the concept is the attacker broadcasts a wifi management “Deauthentication” frame to the victim’s devices/PC to tell them to deauthenticate. It is like, “Hey client! Can you please deauthenticate”. Once deauthenticated, then the client will reconnect to AP (Access Point). These types of frames are supposed to send by valid “AP” to its clients, but the attacker can mimic these frames and broadcast in the network. ...

January 11, 2018 · 3 min · Veerendra K

GNU screen commands(Cheat Sheet)

GNU Screen is a terminal multiplexer, a software application that can be used to multiplex several virtual consoles, allowing a user to access multiple separate login sessions inside a single terminal window, or detach and reattach sessions from a terminal. It is useful for dealing with multiple programs from a command line interface, and for separating programs from the session of the Unix shell that started the program, particularly so a remote process continues running even when the user is disconnected. more ...

January 8, 2018 · 1 min · Veerendra K

Install jekyll in Ubuntu 14.04

👉 Update on 27-08-2022 Moving to Hugo and other updates! I was very excited to try Jekyll and Github Pages when I heard about it. When I try to install jekyll, I got below error root@veeru:/home/veeru# gem install jekyll bundler Fetching: public_suffix-3.0.1.gem (100%) ERROR: Error installing jekyll: public_suffix requires Ruby version >= 2.1. Fetching: bundler-1.16.1.gem (100%) Successfully installed bundler-1.16.1 1 gem installed Installing ri documentation for bundler-1.16.1... Installing RDoc documentation for bundler-1.16.1... I don’t even know what that means(I’m not a Ruby guy, so..). Clearly jekyll needs more than Ruby version 2.1, but in Ubuntu 14.04 if you type apt-get install ruby -y you will end up having Ruby 1.9. So let’s install Ruby 2.4 like below ...

January 7, 2018 · 1 min · Veerendra K

MAC Address Scrambling in Linux

“MAC Address Scrambling“- By the name itself we can understand, instead of using a burned-in address, the machine uses a random MAC address. The machine/device changes MAC addresses regularly to improve security. MAC address is a 48-bit hexadecimal digit which is burned in every electronic device that has the capability of “connectivity” such as mobile devices, smart TV, PC, etc. “Apple” added this feature to iPhones from iOS8 to protect users’ privacy. ...

January 6, 2018 · 3 min · Veerendra K

Home Server Setup

My home server tip, tricks and how-to blogs

May 17, 2026 · 1 min · Veerendra K

Nugget Posts

Some random and small piece of info nuggets 🍪

November 11, 2022 · 1 min · Veerendra K

Elasticsearch Deployment Docs

Hello guys, this documentation on elasticsearch cluster deploy was old and creates two years ago. I kept in my github repo for long time, but I now decided to copy to my blog. ⚠️ These docs have been old, I have added official docs links to each section for reference, so readers be aware of it!

September 10, 2022 · 1 min · Veerendra K

Kubernetes-The Hard Way With Docker & Flannel

January 17, 2019 · 0 min · Veerendra K