Creating users with Ansible Ad-Hoc commands
Customizing hotkeys on keyboard
Installing WordPress on Ubuntu 19.04
BASH scripting with conditional logic
Palo Alto Zones, Interfaces, and Routers – Overview
- Creating users with Ansible Ad-Hoc commandshttps://youtu.be/pr0ZA6pw-jU One of the Ansible modules I was excited to learn about was the user module. With this module we can quickly and easily create and manage users on multiple systems. This […]
- Customizing hotkeys on keyboardI use a Dell keyboard, model Y-U0003-DEL5 that has a string of hotkeys on the top of it. These keys for the most part are useless to me because they are primarily for web browsing (back, forward, […]
- Installing WordPress on Ubuntu 19.04https://youtu.be/2P9KBdkoLF0 Install LAMP Stack To begin installation of the LAMP stack (Linux, Apache, MariaDB, PHP) we update the apt catalog. Then we select the packages to install. NOTE: We are […]
- BASH scripting with conditional logichttps://youtu.be/jnjcV9vPZIU IF/THEN statements #!/bin/bash echo "What would you like to see? Todays date (d) Currently logged in users (u) The contents of the / directory (r) Enter your […]
- Palo Alto Zones, Interfaces, and Routers – OverviewPalo Alto firewalls can be very simple to use and implement, or they can be very difficult. Because there are so many possible components and areas of configuration in these firewalls, understanding […]
Website DefacementPerforming website defacement once inside a company. While historically a somewhat benign activity, website defacement today is a gateway for hackers to attack you organization, and others.
Using Bruter to Attack Web ServicesIn this video we discuss the use of the Windows tool Bruter. This tool, similar to how movies portray hacking, attacks web services by guessing passwords against the system.
We also discuss what this means for your role as a security engineer. How you can identify this type of activity, and how to protect your organization
Configuration of Cisco devices with AnsibleIn this video we cover the basics of how to manage Cisco routers using Ansible. From the inventory file, to the playbooks, we walk through how to connect, run simple tasks, and modify configurations.
How to download and setup the Cisco CSR1000v in Hyper-VIn this video I briefly describe how to download the Cisco CSR1000V, a virtual router from Cisco and install it in a Hyper-V virtual machine. This is a great alternative to using physical routers in an all-virtual environment, or when learning about Cisco and how to configure the IOS.
NOTE: I do not know the full legal implications of running Cisco IOS in a virtual environment. If you do this, please research the licensing requirements yourself
Using Armitage to pivot attacks to the internal networkIn this video, we show how easy it is for hackers to utilize a compromised system to attack other systems in the "trusted" network. By pivoting, or routing through the compromised system, the entire internal network is vulnerable to attacks.
We then discuss options on how to further secure the internal environment to make this pivoting more difficult to the attacker.
Using Armitage to attack an Internet facing Web ServerIn this video we use the information learned from our NMAP scan of a host to attack the web server. Specifically, we walk through the process of using Armitage, a GUI front-end to Metasploit, to attack the machine.
We then discuss how attackers can easily use these tools, and ways for security engineers to protect their environments.
Using NMAP to find vulnerabilitiesThis video walks through using the tool NMAP to scan a target. We then review the output of the command, along with some internet searching, to identify potential vulnerabilities to the system scanned. We then discuss ways to improve potential vulnerabilities to the system.
Pivoting your cyber attack to trusted machinesThis video shows how an attacker could potentially compromise a low-priority system, and then use that system to attack more critical systems/services. This pivoting highlights the need to maintain the entire environment, and possibly stop trusting your own systems.
Using WGET to harvest web credentialsA walk-through of the process a hacker may perform to duplicate legitimate websites. This duplicated website can then be used to lure unsuspecting traffic to harvest/steal credentials
Creating users with Ansible ad-hoc commandsA brief walkthrough of using Ansible ad-hoc commands to create users on remote systems. This walks through the process of creating users, generating password hashes, and removing the users.
Additionally, this video highlights a common error that may occur that stop the passwords from being passed properly
Introduction to automation with AnsibleAn introduction to systems management and automation in Ansible. This video includes the installation of Ansible, configuring of the initial inventory file, and performing ad-hoc commands. Then, we create our first playlist with a few simple plays to show how Ansible works
Using Spear Phishing to Target an OrganizationA walkthrough of how a hacker can use Spear Phishing, or targeted email messages, to attack an organization