s2p
Sysadmin  SecurityAndPentests (Children in Sysadmin Web)

Children of SecurityAndPentests in Sysadmin Web

Results from Sysadmin web retrieved at 13:48 (GMT)

ApacheSecurity
Apache Security * ModSecurity
DdoS
distributed denial of service DDOS * SynAttack
DefaultPasswords
default passwords $ Network Extreme (X250e): admin:(none) $ IBM Hardware Management Console: hscroot:abc123 root:passw0rd hscpe:abc123 Links * http://r...
ForensiC
Forensic * MacForensic
LookAtYourLogs
Control your logfiles syslog and syslog ng * logging via tcp and udp * support for stunnel Syslog analyzers * logwatch * swatch (opensource) * pr...
MetaSploit
metasploit Metasploit is a valuable tool in pen testing a network. However, it can be very confusing for a beginner. metasploit doku Here some demosessions $ ...
NessusSignPlugin
Sign own plugin in Nessus openssl genrsa aes128 1024 /opt/nessus/var/nessus/MyCustomKey.priv.pem openssl rsa pubout /opt/nessus/var/nessus/MyCustomKey.pem /o...
PVlan
private VLAN (PVLAN) VMWare * http://kb.vmware.com/selfservice/microsites/search.do?language=en_US cmd=displayKC externalId=1010691 * http://pubs.vmware.co...
PgP
GnuPG and PGP PGP key server * https://pgp.mit.edu/ * http://www.pgpi.org/services/keys/keyservers/ * http://www.uk.pgp.net/pgpnet/wwwkeys.html * htt...
PlotHydraLogins
Plot successfull logins with gnuplot #!/bin/sh # Erfolgreiche Logins plotten cat tmp.all.hydraout5 grep v "^# Hydra" grep v 10.135.88.177 sort n uniq ...
SMiME
S/MIME for mails in Mac OS X and iOS Links * http://www.heise.de/ct/artikel/Brief mit Siegel 1911842.html * http://.cacert.org * http://wiki.cacert.org/...
SecurityModels
Security Models * castle, perimeter, wall, inside, outside * ZeroTrust, Kerberos, BeyondCorp, perimeter less
SolarisTelnetExploit
Solaris telnet exploit ~# telnet telnet environ define TTYPROMPT abcdef telnet o 10.130.1.23 Trying 10.130.1.23... Connected to 10.130.1.23. Escape character is...
SsH
ssh and ~/.ssh/config Work in progress * http://www.cyberciti.biz/faq/create ssh config file on linux unix/ * fefe about ssh * ssh best practice
StartWithAPolicy
Start with a policy or trust model * resources from the sans institute
SunCryptoAccelerator6000Board
Sun Crypto Accelerator 6000 Board How to set the SCA6000 to factory default and initialize it again. I bought a Sun Crypto Accelerator 6000 Board (data sheet) fr...
Top10SecurityTools
Most important tools 1 brain, brain, brain I couldn’t stress it out further or "a fool with a tool is still a fool" 2 fundamentals, you have to certain ab...
YubiKey
TOTP with YubiKey WORK IN PROGRESS The TOTP with YubiKey does not work. The Base32 calculator.xlsx does not calculate the right HEX Code. Here is an online conve...
Number of topics: 18