How To Secure Invision Power Board (IPB)

How To Secure Invision Power Board

This guide will show you how to increase the security of an Invision Power Board (IPB) installation. We’ll walk through practical examples for you to follow to harden IPB, reducing your attack surface.

There are a lot of insecure default options which unless modified will put you at a higher risk of being compromised by an attacker. Here we will outline what should be modified to increase security of IPB.

Read more »

25 Useful yum Command Examples For Package Management In Linux

How To Use Yum - Command Examples

Yellowdog Updater Modifier (yum) is an RPM based package manager which is used to install and update packages in various Linux distributions including CentOS, RHEL and Fedora.

Yum is quite powerful as it’s capable of automatically resolving dependency issues, and is similar to other package managers such as ‘apt-get’ in Debian based distributions.

These examples should serve as a useful introduction, guide or cheat sheet style resource for how to use the yum command in Linux.

Read more »

17 Bash History Command Examples In Linux

Bash History Command Examples In Linux

The ‘history’ command available in Bash can be used to simply display your shell history, however there’s also a whole lot more that you can do with it, which we’ll demonstrate here.

Bash history allows us to quickly see what has been executed previously on a system, allowing you to hold users at least somewhat accountable for their actions (more on this later). It’s also useful if you’ve run something before and forgot the command, I can’t begin to tell you the number of times that I’ve done this!

Read more »

How To Backup Windows Server 2016


Here we’ll show you how to install the Windows Server Backup feature in Windows Server 2016 with PowerShell and then configure basic server backups.

We’ll also take a quick look at how the backup files are stored and see if they are at all encrypted or not.

Read more »

Find The IP Address Of A Website Behind CloudFlare

Find Server IP Address Behind CloudFlare

CloudFlare is a freely available service that offers CDN and caching functionality. In order to use CloudFlare a domains DNS will be updated to send all traffic through CloudFlare, as a result it will hide the IP address of the actual web server where the website is hosted in order to provide various protections.

By doing this, CloudFlare essentially hides the real IP address of the web server that is hosting the website. There are many times that we may wish to be able to find the actual IP address of a server behind CloudFlare, such as during a penetration test you may want to bypass the web application firewall (WAF) completely by directly targeting the server itself.

The simple methods outlined here will show you how to find the real IP address of a website that is hidden behind CloudFlare. First we’ll cover the manual methods that can be used so that you understand what is going on before looking at automated options. Along the way we provide mitigations that can be used in order to protect yourself from these methods.

Read more »

Where Are Windows Server 2016 Log Files Stored?

Log File Location Windows Server 2016

This post will show you where the .evtx log files can be found in Windows Server 2016, as well as how they can be viewed with Event Viewer.

Read more »

How To Shrink A Volume In Windows Server 2016

Decrease Disk Space In Windows Server 2016

In this example we shrink the file system of a volume in Windows Server 2016, freeing up space which can be used to create a new partition, or otherwise further decrease the size of the virtual disk to reclaim the space assuming the hypervisor supports this action.

Read more »

How To Mount An NFS Share In Windows Server 2016


Here we’re going to show you how to mount an NFS file share in Windows Server 2016 both temporarily and persistently so that it will automatically mount after a reboot.

There are a couple of different ways this can be done, including mapping a network drive or adding a network location, which we’ll discuss here.

Read more »

How To Enable Or Disable SELinux In CentOS/RHEL 7

How To Enable Or Disable SELinux

Security Enhanced Linux (SELinux) is enabled and running in enforcing mode by default in CentOS/RHEL based Linux operating systems, and with good reason as it increases overall system security.

Despite this there may be times when you want to temporarily or permanently disable SELinux, which is what we’ll cover here.

Read more »

How To Shutdown Windows Server 2016

How To Shutdown Windows Server 2016

There are many different ways we can shutdown Windows Server 2016, in this quick guide we’ll demonstrate how to perform a power off through the graphical user interface, with command prompt, PowerShell, or even remotely.

Read more »