Advanced Search
Search Results
178 total results found
FileBeat
GNU nano 4.8 filebeat.yml --- - name: Installing and Launching Filebeat hosts: webservers become: yes tasks: - name: Download filebeat deb command: curl -L -O https://artifacts.e...
Docker Install
--- - name: InstallDVWA hosts: webservers become: true tasks: - name: Uninstall apache httpd apt: name: apache2 state: absent - name: docker.io apt: update_cache: yes name: docker.io state: present - na...
ELK Install
--- - hosts: elk become: true tasks: - name: Set vm.max_map_count to 262144 ansible.posix.sysctl: name: vm.max_map_count value: 262144 state: present reload: yes - name: docker.io ...
MetricBeat Config
###################### Metricbeat Configuration Example ####################### # This file is an example configuration file highlighting only the most common # options. The metricbeat.reference.yml file from the same directory contains all the # supported op...
MetricBeat
GNU nano 4.8 metricbeat.yml --- - name: Install metric beat hosts: webservers become: true tasks: - name: Download metricbeat command: curl -L -O https://artifacts.elastic.co/d...
Ansible
Ansible Config
# config file for ansible -- https://ansible.com/ # =============================================== # nearly all parameters can be overridden in ansible-playbook # or with command line flags. ansible will read ANSIBLE_CONFIG, # ansible.cfg in the current work...
Hosts
# This is the default ansible 'hosts' file. # # It should live in /etc/ansible/hosts # # - Comments begin with the '#' character # - Blank lines are ignored # - Groups of hosts are delimited by [header] elements # - You can enter hostnames or ip addres...
Red Team Blue Team
Project Write Up
RedTeam vs. BlueTeam Devices Kali Capstone Elk Set Up Beats Need to set up beats in order to log the attacks. Steps to set up: Log into Capstone vagrant:tnargav sudo su filebeat modules enable apache filebeat setup metricbeat mod...
The Important of the Scope of Engagement
Penetration testing is a critical part of securing businesses; however, without limitations, it can be very damaging to an organization. The scope of engagement provides a concrete definition of what the penetration tester is allowed to do. Without that list, ...
Notes
Setting up Beats on Capstone This is done for logging that attacks before attacking Log into capstone - Vagrant:tnargav Sudo su Filebeat modules enable apace Filebeat setup Metricbeat modules enable apache Metricbeat setup Packetbeat setup Systemctl restar...
Security Engineer
Intro to Cryptography
Symmetric Encryption
Overview Symmetric encryption, or secret-key encryption, is a fundamental cryptographic method where the same key (the secret key) is used for both encryption (converting plaintext to ciphertext) and decryption (recovering the plaintext from the ciphertext). T...
Asymmetric Encryption
Diffie-Hillman Key Exchange
Hashing
Overview Cryptographic hash functions transform data of any size into a fixed-length message digest or checksum, with SHA256 producing a 256-bit (64 hexadecimal digit) output regardless of input size. These functions are deterministic and demonstrate the avala...