Пропускане към основното съдържание

Публикации

Показват се публикации от януари, 2016

Kali Linux, Rolling Edition Released – 2016.1

Our First Release of Kali-Rolling (2016.1) Today marks an important milestone for us with the first public release of our Kali Linux rolling distribution. Kali switched to a rolling release model back when we hit version 2.0 (codename “sana”), however the rolling release was only available via an upgrade from 2.0 to kali-rolling for a select brave group. After 5 months of testing our rolling distribution (and its supporting infrastructure), we’re confident in its reliability – giving our users the best of all worlds – the stability of Debian, together with the latest versions of the many outstanding penetration testing tools created and shared by the information security community.

CentOS-6.5-x86_64

Kerberos Protocol

Installation on RedHat Kerberos packages may be installed by default, but make sure that the appropriate packages are installed for the Kerberos server or client being configured. To install packages for a Kerberos server: # yum install krb5-server krb5-libs krb5-auth-dialog To install packages for a Kerberos client: # yum install krb5-workstation krb5-libs krb5-auth-dialog If the Red Hat Enterprise Linux system will use Kerberos as part of single sign-on with smart cards, then also install the required PKI/OpenSSL package: # yum install krb5-pkinit-openssl onfiguring a Kerberos 5 Server 6.858 Fall 2014 Lecture for Kerberos by nu11secur1ty

Channel Bonding Interfaces

Information Security Certifications

Installing ELK (CentOS (6 - NOTE: with your own modified) ,7)

SCHEME OF VISUALIZATION Setting Up an Advanced Logstash Pipeline A Logstash pipeline in most use cases has one or more input, filter, and output plugins. The scenarios in this section build Logstash configuration files to specify these plugins and discuss what each plugin is doing. The Logstash configuration file defines your Logstash pipeline. When you start a Logstash instance, use the -f option to specify the configuration file that defines that instance’s pipeline. A Logstash pipeline has two required elements, input and output, and one optional element, filter. The input plugins consume data from a source, the filter plugins modify the data as you specify, and the output plugins write the data to a destination. The following text represents the skeleton of a configuration pipeline: # The # character at the beginning of a line indicates a comment. Use # comments to describe your configuration. input { } # The filter part of this file is comme...

Searching, Downloading, and Installing Updates for windows cmd cscript

The scripting sample in this topic shows you how to use Windows Update Agent (WUA) to scan, download, and install updates. The sample searches for all the applicable software updates and then lists those updates. Next, it creates a collection of updates to download and then downloads them. Finally, it creates a collection of updates to install and then installs them. If you want to search, download, and install a specific update that you identify by using the update title, see Searching, Downloading, and Installing Specific Updates. Before you attempt to run this sample, note the following: WUA must be installed on the computer. For more information about how to determine the version of WUA that is installed, see Determining the Current Version of WUA. The sample can download updates only by using WUA. It cannot download updates from a Software Update Services (SUS) 1.0 server. Running this sample requires Windows Script Host (WSH). For more information about WS...

OSCP

What it means to be an OSCP

OpenStack Installation Guide for Red Hat Enterprise Linux 7, CentOS 7...

Net-SNMP

DEVELOPMENT Extending Net-SNMP with The NetSNMP::agent Perl module provides an agent object which is used to handle requests for a part of the agent's OID tree. The agent object's constructor has options for running the agent as a sub-agent of snmpd or a standalone agent. No arguments are necessary to create an embedded agent: 1: use NetSNMP::agent (':all'); 2: my $agent = new NetSNMP::agent(); The agent object has a register method which is used to register a callback function with a particular OID . The register function takes a name, OID , and pointer to the callback function. The following example will register a callback function named hello_handler with the SNMP Agent which will handle requests under the OID . 1. 3. 6 . 1. 4 . 1. 8072. 9999 . 9999: 1: $agent->register("hello_tester", ".1.3.6.1.4.1.8072.9999.9999", 2: \& hello_handler); NOTE The OID . 1. 3. 6 . 1. 4 . 1. 8072. 9999.9999 ...

How to defend yourself against MITM or Man-in-the-middle attack

Example Protecting our data online is never going to be an easy task, especially nowadays when attackers are regularly inventing some new techniques and exploits to steal your data. Sometimes their attacks will not be so harmful for individual users. But large-scale attacks on some popular web sites or financial databases, could be highly dangerous. In most cases, the attackers first try to push some malware on to user’s machine. Sometimes this technique doesn’t work out, however. What is Man-in-the-middle attack A popular method is Man-in-the-middle attack. It is also known as a bucket brigade attack, or sometimes Janus attack in cryptography. As its name suggests, the attacker keeps himself / herself between two parties, making them believe that they are talking directly to each other over a private connection, when actually the entire conversation is being controlled by the attacker. A man-in-the-middle attack can be successful only when the attacker forms a mutual...