Setting up an Ubuntu lab in Azure Labs
Installing Visual Studio Code on Fedora 31
Setting up DVWA
Creating users with Ansible Ad-Hoc commands
Customizing hotkeys on keyboard
Setting up an Ubuntu lab in Azure Labs
I have recently had the opportunity to begin using Azure Labs (https://labs.azure.com) for my classes. This lab environment helps to replace a previously self-made and self-maintained VMware […]Installing Visual Studio Code on Fedora 31
https://www.youtube.com/watch?v=hxgNDBoGN8I Install SNAP Microsoft released updates to Visual Studio Code as a SNAP package. Snap is a package management utility similar to apt, yum, or dnf, that is […]Setting up DVWA
https://youtu.be/6EbdPO3nPmo DVWA ( http://www.dvwa.co.uk/ ) is a very useful tool for learning about web-based security. This is not just useful for hackers, but also for security engineers to learn […]Creating users with Ansible Ad-Hoc commands
https://youtu.be/pr0ZA6pw-jU One of the Ansible modules I was excited to learn about was the user module. With this module we can quickly and easily create and manage users on multiple systems. This […]Customizing hotkeys on keyboard
I use a Dell keyboard, model Y-U0003-DEL5 that has a string of hotkeys on the top of it. These keys for the most part are useless to me because they are primarily for web browsing (back, forward, […]
Recent Videos
-
Using Certificates to Encrypt Email
A walk-through of how email is transported across the internet and how it is insecure by default. Then, we use Digital Signatures to Encrypt the email messages to show how the information can be secured. -
Intrusion Detection
A brief walk-through of how Intrusion Detection systems work. This example uses SNORT, an open-source IDS solution to monitor and alert on malicious traffic.
Once SNORT is running, we then use various attacks to show how alerts are generated. -
Abusing Systems
A walk-through of how a hacker can abuse systems and use them to pivot attacks inside your network -
SQL Injection
A short walk-through of how SQL injection is performed. We show how to perform SQL injection, what it looks like on the backend and why it is successful. -
Monitor the health of your Azure virtual machine by using Azure Metrics Explorer and metric alerts
A walk-through of how to setup monitoring on your virtual machines in Azure and how to enable alerting for specific metrics -
Secure your Azure virtual machine disks
A walk-through of the Microsoft Learn Lab to secure your VM disks. This lab shows you how easy it is to create a key vault in Azure and then use those keys to encrypt the VM hard disks -
Protect your virtual machine settings with Azure Automation State Configuration
A walk-through of how to use Azure Automation State Configuration to publish and manage DSC templates -
Create Azure users and groups in Azure Active Directory
A walk-through of the Microsoft Learn Lab. This lab shows how to create an Azure AD environment, create users, and groups in AAD. -
Setting up AD Trusts
A walk-through of setting up trusts in Active Directory -
Creating MSFPAYLOADS
A walk-through of how to create and use MSFPayloads to attack machines in an offline method. -
Exploitation with IPv6
A walk-through of how to attack a computer using IPv6. The process of attacking over IPv6 is mostly the same as over IPv4, but because of the second protocol, the system may not be as secure as expected. -
Transferring and Seizing FSMO Roles
A short walk-through showing different methods of transferring the Flexible Single Master Operations (FSMO) roles in AD. First we transfer them using the GUI tools, then via PowerShell. Finally, we show how to forcibly seize the roles.