Getting started with local LLMs
I’ve recently dove headfirst into running LLMs on my local hardware, and I wanted to share what I’ve learned and how I’ve set it up so others that want to do the same thing, may. If you’re on a Windows Desktop machine, and you just want to interact with LLMs on your desktop, then skip to the section about installing Ollama. Hardware When it comes to the hardware, I utilized my media PC that had mostly been sitting dormant. This PC has a 5700X and RTX 3070 Ti, which is more than enough to get started. As of now in 2024, it’s still a great time to build a PC using new or used parts. If you need to brushup on how to build a PC, LTT created a great video here. I’ve found that most LLMs < 10B parameters (which we’ll talk about later) only need ~8GB of VRAM. So if you’re able to secure a GPU that has that amount of VRAM or less, you’ll be in a great spot. ...
Changing Username on Raspberry Pi
Hey all, I just picked up a Raspberry Pi 4 Model B, and finding this information wasn’t easy. I wasn’t able to have any success with StackOverflow or anything of the sort either. So here’s what you need to do. I used the image of Raspbian located at this link. Without SSH access If you don’t have SSH access, you can simply plugin your display adapters, keyboard and mouse, and spawn a shell. The icon can be found in the top left of your screen if following this guide with a fresh install of Raspbian. ...
CSL Roast (Kerberoasting) Walkthrough
CSL_Machine_Writeup_–Roast(Kerberoasting) – Perf3ct Security Hey everyone, CyberSecLabs was lucky enough to have this box submitted to them by “hackzzdogs”, that highlights the highly sought after skill of Kerberoasting. Kerberoasting was one of the things that I was often asked about in penetration testing interviews, after I obtained my OSCP. Unfortunately, I wasn’t too well versed in it, so I figured that I would take a head first jump into Kerberoasting, and what better way to do it than to do a box that was based on it. In this post I hope to better reveal the process behind Kerberoasting, and the actions required to perform it. ...
CSL ZeroLogon Writeup
In this writeup, I am going to be taking a look at ZeroLogon. At a high level, ZeroLogon comes from an implementation error with Microsoft’s MS-NRPC. I used the exploit that was located here. The only issue that I had with the exploit, is that I was running Impacket v0.9.21. Although this version is stated in the requirements.txt of the GitHub repo, I was having an issue that stated that a function inside of the exploit’s function script was not found in the installed Impacket version. This is what the error looked like when it did occur: ...
Having your own personal Github (hosting Gitea)
Hey all, in this short post I’m going to walk you through how to set up your very own Gitea instance, which is essentially like a self-hosted Github. You can host Gitea in a Docker container, virtual machine, or anywhere that can run Golang. You can even host it on a Raspberry Pi! First, on any debian-based Linux machine (Ubuntu, Mint, Debian, etc.), run the following command to update your apt cache: ...