Categories
-
- iptables: building rules that actually make sense
- hardening SSH: the low-hanging fruit most people skip
- capturing and reading traffic with tcpdump
- securing my lab: lessons that can scale to the enterprise
- scanning for rootkits on linux with chkrootkit
- log analysis for activity detection
- automation of IP removal from an allow list thanks to python
- Incident Journal: Events & Experiences
- file integrity verification with hashing using CertUtil
- blocking SMB via windows firewall & reducing lateral movement
- intercepting HTTP logins with Wireshark
- analyzing a TCP handshake in Wireshark
- SSH & DNS analysis
- nmap local open port scan