ESC
Start typing to search...

Security

Honeypots

Honeypot Diaries: SSH Authorized Keys

Analyzing threat actor activity and malware observed in geographically dispersed honeypots.

Apr 16, 2023 4 min read
Information Security

Managing Password Hygiene

Reviewing the current state of password hygiene and why unique, long, and complex passwords are more important than ever.

Mar 01, 2023 4 min read
Honeypots

Honeypot Diaries: Masscan

A honeypot observations post documenting a threat actor attempting to install and use the masscan port scanner on a compromised host to scan for RDP and SSH targets, with SSH hardening mitigations.

Jun 06, 2022 8 min read
Information Security

Setup and Securing Winlogbeat

Setting up Winlogbeat 8.0 with TLS communication and keystore-based credential management, following the principle of least privilege with role-based API keys.

Feb 21, 2022 8 min read
Automation

Blue Team Tactics: Honey Tokens Pt. II

Part two of the honey tokens series covering PowerShell-based token deployment, validating audit ACL settings, and testing adversary interaction detection via PowerShell remoting, RDP, and Meterpreter process injection.

Sep 01, 2020 7 min read
System Administration

Mounting NFS Shares in Windows Using Identity Mapping

A guide to mounting NFS shares on Windows 10 with read/write access using UID/GID identity mapping via local passwd and group files, improving on the less secure anonymous mount approach.

Jun 16, 2018 2 min read
Home Lab

Raspberry Pi Centralized Log Server

A guide to configuring a Raspberry Pi as a centralized syslog server using rsyslog with per-host log files, log rotation, and forwarding configuration for syslog, rsyslog, and syslog-ng clients.

May 13, 2018 3 min read