I Broke Pi-Hole
screen capture: example of the Pi-hole dashboard

I Broke Pi-Hole

As a way to gain more experience with cybersecurity software, I installed Pi-hole in my desktop computer. Pi-hole is a Linux network-level advertisement and Internet tracker blocking application.

But static IPs are required by Pi-hole, which to me becomes a security compromise. So, in order to continue using dynamic addresses, I wrote a Bash script which gets current addresses and then replaces a Pi-hole configuration file. Below are the Bash instructions I used to return current IPv4 and IPv6 network addresses:

ADDRIPV4=$(echo $(ip a | grep 'inet 10') | cut -d' ' -f 2 | cut -d'/' -f 1); echo $ADDRIPV4

ADDRIPV6=$(echo $(ip a | grep '/64 scope global dynamic noprefixroute') | cut -d' ' -f 2 | cut -d'/' -f 1); echo $ADDRIPV6

But, for some reason, by replacing that configuration file I referred to, I broke that Pi-hole installation, so, for now, I decided not to use the software. That being said, I still like the software, and would recommend that others should try it out themselves.

In the future, I may purchase a Raspberry Pi, since Pi-hole was originally designed to be installed in a RPi.

To view or add a comment, sign in

More articles by Nicholas T

  • PicoGym GET aHEAD Practice Challenge

    I solved the picoCTF/picoGym GET aHEAD challenge. The problem involved the HTTP methods GET, POST and HEAD, since HEAD…

  • 'Stonks' Format String Attack

    I solved the picoGym Stonks practice challenge which featured binary exploitation of code written in C in order to…

  • Convert Port Numbers to picoCTF Key

    I solved picoCTF's Nice netcat..

  • Translated Pictograms to picoCTF Key

    I solved the picoGym challenge titled Transformation, which involved the translation of encoded Chinese pictograms to a…

  • Found Key Hidden in JPEG File

    Today, solved the picoGym ethical hacking challenge titled Information, which challenged users to find a picoCTF key…

  • Decoding ROT13-Encoded Strings

    My first cryptographic practice challenge in picoGym involved decoding a string encoded with the ROT13 cypher. A cypher…

  • First CTF Flag Submission

    Tonight, my first flag was submitted to Carnegie Mellon University's picoGym Practice Challenges—a challenge titled…

Insights from the community

Others also viewed

Explore topics