Move tech articles under guides and add aliases to each so that old links still work.

This commit is contained in:
2025-12-27 19:50:04 -07:00
parent 302b6825ee
commit 16e335303e
5 changed files with 13 additions and 0 deletions

View File

@@ -0,0 +1,217 @@
---
title: "Apple Wireless Issues on Debian 13 (Trixie)"
subtitle: ""
author: Hyperling
date: "2025-11-19T13:00:00-07:00"
toc: true
images:
tags:
- tech
- networking
- linux
- wireless
- apple
- macbook air
- kernel
- broadcom
- bcm4360
- wl
- dkms
- wireless-tools
- iwconfig
- uname
- modprobe
- lsmod
- lspci
- debian
- trixie
series:
- sysadmin
categories:
- guides
aliases:
- /posts/tech/apple-debian-wireless-issues
- /posts/guides/tech/apple-debian-wireless-issues
---
## Disclaimer
This article assumes that your system has had the wireless card working on Debian recently.
I have a Macbook Air 7,2 (early 2015, i5) with a BCM4360 [14e4:43a0] and use the `wl` driver.
``` console
$ sudo apt list broadcom*
broadcom-sta-common/stable 6.30.223.271-26 amd64
broadcom-sta-dkms/stable,now 6.30.223.271-26 amd64 [installed]
broadcom-sta-source/stable 6.30.223.271-26 amd64
```
I do not have experience with other Mac devices, the Debian wiki and forums are your best bet if this article does not apply to you.
{{< external-link "Debian Wiki: Macbook Wireless" "https://wiki.debian.org/MacBook/Wireless" >}}
## Introduction -- Define the Problem
If your wireless card is no longer being recognized on a Debian device, ensure the latest version of the Linux kernel came with its headers.
I'm not sure why this happened, but it was when the kernel version jumped from `6.12.41` to `6.12.43` that its symptoms showed up. I had already migrated from Bookworm to Trixie and thought I had went through a few kernel updates since then without issues, but wasn't sure.
Later versions such as `6.12.48` and `6.12.57` continued to get pulled and I'd try them before having to reboot back to `6.12.41`. While booted into the newer kernel versions `/sbin/iwconfig` would show no wireless network and GNOME didn't have a Wi-Fi button listed in the Settings app nor its system menu. Then I tried this:
``` console
$ sudo modprobe wl
modprobe: FATAL: Module wl not found in directory /lib/modules/6.12.57+deb13-amd64
```
After realizing that the `wl` module wasn't being loaded I thought maybe there was a packaging issue. I was confused since it said it was not found, even though I knew it was installed since it was still working if I booted to the older installed kernel versions. I saw no error when the new versions were being installed, either. And thus began my discovery...
## Solution -- Install Headers Automagically
Ubuntu provides the packages `linux-image-generic` and `linux headers-generic`. Debian names them slightly different.
``` bash
sudo apt install linux-image-amd64 linux-headers-amd64 --reinstall
```
Some sources say that Debian has no generic/meta package for the kernel and its headers. I can't find any information as to the release date of these to confirm or deny that claim.
I'm just glad they work to now keep the headers installed automatically! I've since added the packages to my provisioning setup.
## Still Not Working?
If you're still having problems then it may be something else.
Some good troubleshooting commands are below, as well as examples of when I was running them trying to troubleshoot my system.
- `uname -a`
- `lspci -vnn | grep -i net`
- `/sbin/iwconfig`
- `lsmod`
- `modprobe`
- `apt list`
### Example -- Missing Kernel Headers (6.12.57)
``` console
[user@hostname ~]$ uname -a
Linux debian 6.12.57+deb13-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.57-1 (2025-11-05) x86_64 GNU/Linux
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lspci -vnn | grep -i net
03:00.0 Network controller [0280]: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter [14e4:43a0] (rev 03)
[user@hostname ~]$
```
``` console
[user@hostname ~]$ /sbin/iwconfig
lo no wireless extensions.
docker0 no wireless extensions.
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lsmod | grep wl
[user@hostname ~]$
```
``` console
[user@hostname ~]$ sudo modprobe wl
modprobe: FATAL: Module wl not found in directory /lib/modules/6.12.57+deb13-amd64
[user@hostname ~]$
```
``` console
[user@hostname ~]$ sudo apt list broadcom*
broadcom-sta-common/stable 6.30.223.271-26 amd64
broadcom-sta-dkms/stable,now 6.30.223.271-26 amd64 [installed]
broadcom-sta-source/stable 6.30.223.271-26 amd64
[user@hostname ~]$
```
### Example -- Wireless Working Correctly (6.12.41)
``` console
[user@hostname ~]$ uname -a
Linux debian 6.12.41+deb13-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.41-1 (2025-08-12) x86_64 GNU/Linux
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lspci -vnn | grep -i net
03:00.0 Network controller [0280]: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter [14e4:43a0] (rev 03)
[user@hostname ~]$
```
``` console
[user@hostname ~]$ /sbin/iwconfig
lo no wireless extensions.
wlp3s0 IEEE 802.11 ESSID:"Private :)"
Mode:Managed Frequency:2.412 GHz Access Point: na:na:na:na:na:na
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off
wg0-vpn no wireless extensions.
docker0 no wireless extensions.
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lsmod | grep wl | sort
cfg80211 1392640 1 wl
wl 6459392 0
[user@hostname ~]$
```
``` console
[user@hostname ~]$ sudo modprobe wl
[user@hostname ~]$
```
### Example -- Wireless Working Correctly (6.12.57)
``` console
[user@hostname ~]$ uname -a
Linux debian 6.12.57+deb13-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.57-1 (2025-11-05) x86_64 GNU/Linux
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lspci -vnn | grep -i net
03:00.0 Network controller [0280]: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter [14e4:43a0] (rev 03)
[user@hostname ~]$
```
``` console
[user@hostname ~]$ /sbin/iwconfig
lo no wireless extensions.
wlp3s0 IEEE 802.11 ESSID:"Private :)"
Mode:Managed Frequency:2.412 GHz Access Point: na:na:na:na:na:na
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off
wg0-vpn no wireless extensions.
docker0 no wireless extensions.
[user@hostname ~]$
```
``` console
[user@hostname ~]$ lsmod | grep wl | sort
cfg80211 1392640 1 wl
wl 6459392 0
[user@hostname ~]$
```
``` console
[user@hostname ~]$ sudo modprobe wl
[user@hostname ~]$
```

View File

@@ -0,0 +1,107 @@
---
draft: false
pinned: false
title: "Linux Laptop"
subtitle: "Buying a device with Linux pre-installed."
author: Hyperling
date: "2025-12-08T07:00:00-07:00"
started: "2025-12-04T11:38:00-07:00"
lastmod:
toc: true
images:
tags:
- tech
- laptop
- desktop
- linux
- Debian
- Arch
- Ubuntu
- Dell
- Lenovo
series:
- sysadmin
categories:
- advice
aliases:
- /posts/tech/linux-laptop
- /posts/guides/tech/linux-laptop
---
## Introduction
I was recently contacted for advice on for buying a laptop with Linux already installed. Below is my response as well as some extra thoughts on the subject.
## Laptop Advice
> Howdy!! Thanks for reaching out about this! From my experience the preinstalled Linux sphere is usually expensive gaming, developer, or other specialty type systems for enthusiasts. (NovaCustom, System76, Purism)
>
> The Pinebook Pro is the only budget device for daily driving that I can think of, and you may be able to buy an SD card with an OS preinstalled. It has an ARM processor rather than a normal desktop type processor, but depending on what you're doing it may not matter, like for web browsing.
>
> It looks like both Lenovo and Dell allow choosing Ubuntu and maybe other Linux distributions when configuring some of their laptops. It knocks down the price some too since they don't have to license out a proprietary OS. This option would probably be ideal for someone with no tech background. There may be other companies too.
>
> [https://www.lenovo.com/us/en/d/deals/custom/?visibleDatas=1014%3ALaptops%3B699%3ALinux&sortBy=priceUp](https://www.lenovo.com/us/en/d/deals/custom/?visibleDatas=1014%3ALaptops%3B699%3ALinux&sortBy=priceUp)
>
> [https://www.dell.com/en-us/shop/dell-laptops/scr/laptops/appref=ubuntu-linux-os?sortBy=price-ascending](https://www.dell.com/en-us/shop/dell-laptops/scr/laptops/appref=ubuntu-linux-os?sortBy=price-ascending)
>
> Otherwise I've always bought the device which fits my needs best and then wiped it and installed the OS of my choosing. Used laptops are great for that if you don't want big tech companies getting kickbacks from places like Best Buy which sell laptops with licensed OS's.
>
> Linux can run on most hardware, and can give life back to devices over 10 years old which people thought were too slow to be useful anymore. I'd avoid Apple since they can be a pain to set up. Otherwise anything with a working battery, screen, and keyboard would be fine. If it has 8GB of RAM or more then it will have plenty of power for today's needs.
>
> Also, I recommend keeping backups of important documents on an external flash or hard drive in case of drive failure. Especially if going the used device route. Private cloud storage can be okay too if you trust the owner. Most drives last a long time but I've been burned by one going out early, it's not fun. 🙃
>
> I'd love to hear what you end up doing! Let me know if you have any other questions. :)
## Final Thoughts
The requester already had a refurbished laptop and opted to back up their files to an external device and give installing the OS a go.
If you have a spare USB drive, the process is fairly simply. There are applications for putting the installer on the flash drive, then you just plug it in and reboot the device. When it shows the laptop's brand name on the screen, you press a button, usually F10 or similar, choose the USB device, then follow the prompts from the installer.
There are plenty of guides on how to do this. I've listed a few below. It can be a very educational process, especially if you already have some experience at the terminal or with Linux in general. Then once you get fairly experienced, installing a system like Arch is extremely rewarding and teaches you a lot about what it actually takes to make a distribution and what all the running components are under the hood.
All in all, getting away from big tech is highly recommended. Windows, MacOS, and ChromeOS are all spyware meant to keep you in a locked down consumerist cycle. iOS and Google Android are no better. Liberating your devices by installing a FLOSS operating system! As of this writing I choose to use Debian on my desktops and servers, and on my smartphones I run LineageOS with microG.
Feel free to give me a holler if you make a dive into this sphere and need any pointers! :)
## Installation Guides (Desktop)
Walkthroughs of how to put a new operating system on your device.
### Beginner
- Ubuntu
- {{% external-link "https://ubuntu.com/tutorials/install-ubuntu-desktop#1-overview" %}}
- Pop!_OS
- {{% external-link "https://support.system76.com/articles/install-pop/" %}}
- Linux Mint
- {{% external-link "https://linuxmint-installation-guide.readthedocs.io/en/latest/" %}}
### Intermediate
- Debian
- {{% external-link "https://www.debian.org/releases/trixie/arm64/" %}}
- Fedora
- Shorter: {{% external-link "https://docs.fedoraproject.org/en-US/fedora/latest/getting-started" %}}
- Detailed: {{% external-link "https://docs.fedoraproject.org/en-US/fedora/f36/install-guide/" %}}
- openSUSE
- {{% external-link "https://doc.opensuse.org/documentation/leap/startup/html/book-startup/art-opensuse-installquick.html" %}}
### Advanced
- Arch Linux
- {{% external-link "https://wiki.archlinux.org/title/Installation_guide" %}}
- FreeBSD
- {{% external-link "https://docs.freebsd.org/en/books/handbook/bsdinstall/" %}}
## Installation Guides (Mobile)
### Beginner
- GrapheneOS
- {{% external-link "https://grapheneos.org/install/" %}}
### Intermediate
- LineageOS
- {{% external-link "https://wiki.lineageos.org/" %}}

View File

@@ -0,0 +1,46 @@
---
draft: false
pinned: false
unlisted: false
hidden: false
title: "Session Messenger"
subtitle: "How to contact me on Session."
feathericon: message-circle
author: Hyperling
date: "2025-12-21T08:30:00-07:00"
started: "2025-12-20"
lastmod:
toc: false
images:
tags:
- tech
- session
- messenger
- chat client
series:
- privacy
categories:
- guides
aliases:
- /session
- /posts/tech/session
- /posts/tech/session-messenger
- /posts/guides/tech/session
- /posts/guides/tech/session-messenger
---
I've recently joined a new messenger. Below are the steps on how to add me:
---
1. Install Session:
> [getsession.org/download](https://getsession.org/download)
2. Send a message to this Account ID:
> 05401e7dd4627428daa2fb8db37e80ac4a9673aee8373ad17b97682ace82b17121
3. Wait for a response! :)
---
You may also check the [Contact](/contact) page for other ways that I communicate.
Thanks for dropping by! ^_^

View File

@@ -0,0 +1,49 @@
---
title: "SSH Key Access"
subtitle:
author: hyperling
date: "2025-11-13T20:00:00-07:00"
tags:
- tech
- networking
- linux
- ssh
series:
- sysadmin
categories:
- guides
aliases:
- /posts/tech/ssh-keys
- /posts/guides/tech/ssh-keys
---
How to set up an SSH key and use it to access a remote machine.
### Generate Key
``` bash
ssh-keygen
```
### Copy the Key
``` bash
ssh-copy-id [-p port_nbr] username@server_or_IP
```
So this may look like one of the below.
``` bash
ssh-copy-id sftp@12.34.56.78
ssh-copy-id -p 2222 leethaxor@pwnnoobs.pro
```
### Profit
Now you should be able to log in or copy files without needing to type a password.
``` bash
ssh [-p port_nbr] username@server_or_IP
scp [-P port_nbr] username@server_or_IP:file_to_pull local_path_to_save
scp [-P port_nbr] local_path_to_send username@server_or_IP:remote_path_to_save
```

View File

@@ -0,0 +1,150 @@
---
title: "System Hardening"
subtitle: "Preventing Hacks"
author: Hyperling
date: "2025-11-13T21:00:00-07:00"
tags:
- tech
- hacking
- cracking
- exploit
- networking
- lynis
- nmap
- metasploit
series:
- sysadmin
categories:
- guides
toc: true
#toc_start_level: 2
#toc_end_level: 5
aliases:
- /posts/tech/system-hardening
- /posts/guides/tech/system-hardening
---
## Tips on System Penetration Testing
How to check for system vulnerabilities through self-audits.
*A few of these tools can be used offensively. It is bad etiquette to use them on systems which you do not own. Please respect others and do not attempt to cause harm.*
### Lynis
Local testing suite which not only tests for security weaknesses, but also that best practices are being used in a POSIX environment (UNIX/Linux type standard).
#### Install
This program is best installed as root.
``` bash
sudo su -
git clone https://github.com/CISOfy/lynis /opt/lynis
chmod -R 644 /opt/lynis
chmod 755 /opt/lynis/lynis
```
#### Testing
It is also best run as root, and executed from the install directory.
``` bash
sudo su -
cd /opt/lynis
./lynis audit system
```
If placing the contents into a file, you'll want to disable the colors to prevent unreadable special characters meant for terminal output.
``` bash
./lynis audit system --no-colors > /root/lynis_results.txt 2>&1
```
#### Results
The output has a human readable section of results which give a description and ID for anything which is found. Suggestions are the lowest priority, with Found and Warning being the more important items to correct.
### NMap
***This tool can be considered aggressive and should not be used against any systems you do not own or have explicit permission to test against.***
#### Setup
Install `nmap` from your package manager.
- Debian Distros
``` bash
sudo apt update && sudo apt install -y nmap
```
- Fedora Distros
``` bash
sudo dnf install -y nmap
```
- Arch Distros
``` bash
sudo pacman -Syq nmap
```
#### Testing
**Never run the `-A` parameter against an unsuspecting system.**
Run this command to get a detailed summary of ports with an attackable surface:
``` bash
nmap -A -p- --script=vuln server_or_IP
```
To simply see the open ports on a device, you may use the `--open` parameter:
``` bash
nmap --open server_or_IP
```
This program executes more quickly if run from the local machine by using `localhost`, `127.0.0.1`, `0.0.0.0`, etc.
If you'd like the output saved into a file, pipe it with `>` to your desired directory.
For example, to place a local vulnerability scan into your Downloads directory:
``` bash
nmap -A -p- --script=vuln localhost > ~/Downloads/nmap_report.txt 2>&1
```
#### Resolving Discoveries
If any vulnerabilities show up they usually come with a CVE which can be researched, such as `CVE-2007-6750`.
There are many reputable sites which come up when placing this in a search engine.
{{< external-link
text="cve.org"
url="https://www.cve.org" >}}
is also supposed to be a good centralized repository,
Here are examples for the provided ID.
- {{< external-link
text="www.suse.com/security/cve/CVE-2007-6750.html"
url="https://www.suse.com/security/cve/CVE-2007-6750.html" >}}
- {{< external-link
text="www.cve.org/CVERecord?id=CVE-2007-6750"
url="https://www.cve.org/CVERecord?id=CVE-2007-6750" >}}
Most vulnerabilities are fixed by upgrading software, migrating to safer software, and by following best practices such as not exposing databases to the Internet.
### Metasploit
***This tool IS aggressive and should NEVER be used against any systems you do not own or have explicit permission to test against.*** **Thank you.**
I recommend playing with Metasploit if you have extra time so that you can learn how easy it is to penetrate an exploit once it is found with NMap.
- {{< external-link
text="www.metasploit.com"
url="https://www.metasploit.com/" >}}
Please be sure to test against your own machines, such as setting up a VM running an old Ubuntu LTS, starting up some services like CUPS, SSH, Apache, etc.
There are also VMs available such as Metasplotable 2 and 3 which come with the attack surfaces already set up for you.
This what "script kiddies" use to crack systems and "hack" people. From my experience it makes the process very easy.