Tag Archives: Security

How To Secure Invision Power Board (IPB)

How To Secure Invision Power Board

This guide will show you how to increase the security of an Invision Power Board (IPB) installation. We’ll walk through practical examples for you to follow to harden IPB, reducing your attack surface.

There are a lot of insecure default options which unless modified will put you at a higher risk of being compromised by an attacker. Here we will outline what should be modified to increase security of IPB.

Read more »

How To Enable Or Disable SELinux In CentOS/RHEL 7

How To Enable Or Disable SELinux

Security Enhanced Linux (SELinux) is enabled and running in enforcing mode by default in CentOS/RHEL based Linux operating systems, and with good reason as it increases overall system security.

Despite this there may be times when you want to temporarily or permanently disable SELinux, which is what we’ll cover here.

Read more »

How To Add A Nessus Scanner To SecurityCenter Using Certificates

Add Nessus Scanner To Tenable SecurityCenter

This guide will show you how to add a Nessus scanner into Tenable’s SecurityCenter using certificate based authentication, rather than standard username and password authentication.

Read more »

How To Upgrade/Migrate Ejabberd XMPP Server On Linux

Migrate Or Upgrade Ejabberd XMPP Server In Linux

In this example we will be upgrading from an older instance of the ejabberd-15.04 XMPP server to the current latest version ejabberd-16.06. Operating system specific packages such as RPM and DEB files were not provided until ejabberd-15.06, so our existing instance was not installed with the RPM file but instead from the binary file, meaning there is no existing ejabberd RPM installed for us to simply upgrade.

While this upgrade is taking place on the same server, these steps can also be used to perform a migration from one server to another with a fresh installation of ejabberd, as the new version will install to a new directory.

Read more »

How To Migrate Tenable SecurityCenter

Migrating Tenable SecurityCenter

Here we’re going to cover how to migrate an existing running instance of Tenable SecurityCenter from one Linux server to another.

I was not able to find great documentation around this process, and after contacting Tenable support for instructions I found that the steps provided were very basic and did not actually include everything needed, so I have documented everything that I needed to do here.

Read more »

AusCERT 2016 CTF – Game of memory write-up

The AusCERT 2016 Capture The Flag (CTF) was run from the 24th to 26th of May 2016, these are my solutions to the “Game of memory” category of challenges which was made up of 5 parts each worth 100 points, for a total of 500 points.

Read more »

AusCERT 2016 CTF – myfirst_cmd write-up

The AusCERT 2016 Capture The Flag (CTF) was run from the 24th to 26th of May 2016, this is my solution to the first “Pwning” challenge myfirst_cmd which was worth 100 points.

Read more »

Google CTF 2016 – Forensic “For1” Write-up

The Google Capture The Flag (CTF) was run on the 29th and 30th of April 2016, this is my solution to the forensics challenge “For1” which was worth 100 points.

Read more »

Google CTF 2016 – Forensic “For2” Write-up

The Google Capture The Flag (CTF) was run on the 29th and 30th of April 2016, this is my solution to the forensics challenge “For2” which was worth 200 points.

Read more »

How To Use Firewalld Rich Rules And Zones For Filtering And NAT

Use Firewalld Rich Rules And Zones For Filtering And NAT

Here we cover the RHCE exam objective “Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)” in Red Hat Enterprise Linux (RHEL) 7.

Read more »