Your cart is currently empty!
Category: Phoenix BlackOps Blog
SYN Flood DoS Attack Explained
SYN Flood DoS Attack Explained SYN Flood DoS Attack Explained August 6, 2024 What is a SYN Flood DoS Attack? When two devices first create a TCP connection via the TCP three way handshake, the client machine sends what is called a SYN request to the server. The server then responds with a SYN/ACK and…
Exploring a WordFence Activity Report
Exploring a WordFence Activity Report Exploring a WordFence Activity Report August 5, 2024 WordFence is a well known security solution for WordPress websites. It is packed with security features including the wordfence web application firewall, website hardening capabilities, monitoring, logging, bruteforce prevention, 2FA etc. One of its features is its ability to send weekly and…
Intro to Nmap
Intro to Nmap Intro to Nmap July 17, 2024 Nmap (or Network Mapper) is a tool that aids in scanning devices on a network. A hacker favorite as well as an essential in network administration, Nmap can discover devices on a network, discover open ports on devices, discover the OS and software devices are running…
NMAP –Help V7.80
NMAP –Help NMAP –Help July 16, 2024 This is just a copy of nmap –help Copy to clipboard # Run nmap –help to display this help page in the terminal Nmap 7.80 ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1;…
-
Taping Cams for Security?
It comes down to privacy, cams connected to the internet, if hacked could be used to spy on victims.
Setup 2FA on an SSH Server with Recovery in Mind
Setup 2FA on an SSH Server with Recovery in Mind Setup 2FA on an SSH Server with Recovery in Mind June 29, 2024 When you’ve enabled time based 2FA authentication on a remote ssh server, have you ever wondered what you might do if you lost your phone? What about if your server lost track…
Why You Might Not Want to Enable Time-Based 2FA on a SSH Server
Why You Might Not Want to Enable Time Based 2FA on a Remote SSH Server Why You Might Not Want to Enable Time Based 2FA on a Remote SSH Server June 29, 2024 This might seem against best principles in server management and protection, but if you’ve ever had a server’s time go hay-wire or…
Encrypt Files with OpenSSL in Linux
Encrypt Files with OpenSSL in Linux Encrypt Files with OpenSSL in Linux June 28, 2024 Do you need to send a sensitive or secret email through Gmail or another email provider? Or have you ever needed to keep sensitive company info on a personal computer while traveling? If so you should encrypt these files so…
Configuring WordFence for WordPress Security
Configuring WordFence for WordPress Security Configuring WordFence for WordPress Security June 2024 June 25, 2024 WordFence is a long-standing and powerful WordPress security plugin / solution. Protecting over 5 million sites, WordFence’s web-app firewall includes 467 firewall rules and it’s scanner includes 4,929 malware signatures. WordFence also offers 2FA for your WordPress site, numerous security…
Disk vs Application Level Encryption
Disk Vs. Application Level Encryption Phoenix Black Ops Blog Disk vs Application Level Encryption Setup SSH Keys Intro to Cryptography Check a File's Integrity via Checksums Site Backup Policy Disk Vs. Application Level Encryption Disk Encryption Disk encryption protects the data stored on the physical disk. It ensures that if an attacker gains physical access…