Your cart is currently empty!
Author: NorStar
Using Wazuh for File Integrity Monitoring
Using Wazuh for File Integrity Monitoring Using Wazuh for File Integrity Monitoring August 16, 2024 In this tutorial I go through Wazuh’s File Integrity Monitoring (FIM) capabilities. I will explore the FIM dashboards, experiment with modifying some files, and some minor configuration changes. The aim is that by the end of the tutorial you have…
Installing Wazuh on Ubuntu
Installing Wazuh on Ubuntu Installing Wazuh on Ubuntu August 15, 2024 In this tutorial I go through installing Wazuh, an opensource SIEM on Ubuntu. It covers installing both the Wazuh Manager and the Wazuh Agent. The official Wazuh quickstart docs can be found here: https://documentation.wazuh.com/current/quickstart.html so if you are running an OS other than Ubuntu…
Phoenix Data CS Risk Framework
Phoenix Data CS Risk Framework Phoenix Data CS Risk Framework August 14, 2024 This post outlines the Phoenix Data CS Risk Framework (current version Beta 1.2).ย It addresses data assessment, data classification, and data scoring against the CIA Triad to determine data risk. The aim of the project is to provide a streamlined framework for…
Using Keycloak as an IAM Provider for WordPress
Using Keycloak as an IAM for WordPress Using Keycloak as an IAM for WordPress August 9, 2024 This tutorial walks you through setting up Keycloak as an IAM for one or more WordPress sites. Before You Implement This in Production I have only done this in a development environment and this setup is likely lacking…
Vanilla Bare Metal Keycloak Install for Linux in Dev Mode
Vanilla Bare Metal Keycloak Install -Linux Vanilla Bare Metal Keycloak Install -Linux August 9, 2024 This is the the bare metal plain vanilla keycloak install on Linux. I used an Ubuntu like machine, however it should work on any distro. This tutorial follows the directions in the official docs which can be found here: https://www.keycloak.org/getting-started/getting-started-zip.…
-
Desert Mountains
Desert Mountains Artist 3D / 2D Program Winston Miely 3D Blender Variants Variant 1 Variant 2 Variant 3
-
ICMP Flood DoS Attack Explained
ICMP Flood DoS Attack Explained ICMP Flood DoS Attack Explained August 6, 2024 What is an ICMP Flood DoS Attack? ICMP stands for Internet Control Message Protocol and serves as a means to troubleshoot network issues, network diagnostics, and so forth. When one computer sends an ICMP echo-request to another computer, the receiving computer responds…
SYN Flood DoS Attack Explained
SYN Flood DoS Attack Explained SYN Flood DoS Attack Explained August 6, 2024 What is a SYN Flood DoS Attack? When two devices first create a TCP connection via the TCP three way handshake, the client machine sends what is called a SYN request to the server. The server then responds with a SYN/ACK and…
Intro to Virtual Machines
Intro to Virtual Machines Intro to Virtual Machines August 5, 2024 In this extremely short article on virtual machines we cover what a a virtual machine is and what a hypervisor is. We briefly go over different types of virtual machines, etc. Let’s dive! What is a Virtual Machine? Virtual machines are virtual computers that…
Exploring a WordFence Activity Report
Exploring a WordFence Activity Report Exploring a WordFence Activity Report August 5, 2024 WordFence is a well known security solution for WordPress websites. It is packed with security features including the wordfence web application firewall, website hardening capabilities, monitoring, logging, bruteforce prevention, 2FA etc. One of its features is its ability to send weekly and…