<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>System on Tyler's Blog</title><link>https://blog.zars.me/tags/system/</link><description>Recent content in System on Tyler's Blog</description><generator>Hugo</generator><language>en-us</language><copyright>© Athul</copyright><lastBuildDate>Mon, 20 Nov 2023 12:13:32 +0530</lastBuildDate><atom:link href="https://blog.zars.me/tags/system/index.xml" rel="self" type="application/rss+xml"/><item><title>Kali x86 VNC Headless Setup</title><link>https://blog.zars.me/posts/kali-headless-setup/</link><pubDate>Mon, 20 Nov 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/kali-headless-setup/</guid><description>Overview I wanted to be able to use an old Intel NUC for a headless Kali instance. I came into a lot of problems with Kali&amp;rsquo;s defualt TightVNCServer being a gray (grey?) screen and found the solution below to work perfectly. I enable autologin for headless operation to run my userspace application launching VNC but with the option to also SSH in assuming that doesn&amp;rsquo;t work. This solution will make the defualt desktop on our fake display adapter available over VNC.</description></item><item><title>Hacking Together An Elgato Key Light Air Siri Shortcut</title><link>https://blog.zars.me/posts/elgato-key-light/</link><pubDate>Wed, 02 Aug 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/elgato-key-light/</guid><description>Overview The Elgato Key Light Air has a hidden unprotected HTTP API running on the device at all times. This API lives behind port 9123 and allows for information GETting and PUTting. This allows anyone to get the current configuration of the light and update those values. The original source for the finding of this API can be found here.
The JSON used for the GET/POST request looks like this:</description></item><item><title>HeroCTF V5</title><link>https://blog.zars.me/posts/heroctfv5/</link><pubDate>Mon, 15 May 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/heroctfv5/</guid><description>Overview HeroCTF was my first solo team attempt at CTF&amp;rsquo;ing. It was a blast and huge props to the authors of the challenges. I had fun solving all the ones I did and had plenty of time to experiment with the ones I couldn&amp;rsquo;t. The CTF was hosted here: link. I&amp;rsquo;ll break down my solves below in no particular order.
dev.corp 1/4 The famous company dev.corp was hack last week.. They don&amp;#39;t understand because they have followed the security standards to avoid this kind of situation.</description></item></channel></rss>