Understanding SMTP What is SMTP? SMTP stands for simple mail transfer protocol. It is utilized to handle the sending of emails. In order to support email services, a protocol pair is required, comprising of SMTP and POP/IMAP. Together they allow the user to send outgoing mail and retrieving incoming mail, respectively. The SMTP […]
Understanding NFS What is NFS? NFS stands for Network File System and allows a system to share directories and files with others over a network. By using NFS, users and programs can access files on remote systems almost as if they were local files. It does this by mounting all, or portion of a […]
Understanding telnet What is telnet? Telnet is an application protocol which allows you, with the use of telnet client, to connect to and execute commands on a remote machine that’s hosting a telnet server. The telnet client will establish a connection with the server. The client will then become a virtual terminal – allow […]
Understanding FTP What is FTP? File transfer protocol is a protocol used to allow remote transfer of files over a network. It uses a client-server model to do this. It relays command and data in a very efficient way. How does FTP work? A typical FTP session operates using two channels: A command channel A data channel The command channel is used for transmitting commands as well as replies to those commands, while the data channel is used for transferring data. FTP operates using a client-server protocol. […]
Understanding SMB SMB – Server Message Block Protocol – is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network. Servers make file systems and other resources available to clients on the network. Client computers may have their own hard disks, but they also want access to the shared file systems and printers on the servers. The SMB protocol is known as a response-request protocol, meaning that it transmits […]
Introduction When a computer runs a network service, it opens a networking construct called a “port” to receive the connection. Ports are necessary for making multiple requests or having multiple services available. For example, when you load several webpages at once in a web browser, the program must have some way of determining which […]
Forewords In this blog series I will write down my notes from the courses I take from TryHackMe. This series is from the Complete beginner course where I will go through Network security, Web App security, different tools I use etc. I recommend anyone wanting to learn pentesting or defensive […]
When using NGINX as a reverse proxy with wordpress and having enabled SSL, you will have to force wordpress to forward HTTP to HTTPS. First, setup your wordpress website and NGINX reverse proxy with SSL. You will notice that CSS will not load when you visit your domain, instead of […]
Backup gives you a peace of mind! Sometimes backing up your files is enough, but other times, backing up your entire operating system is necessary. If you get a boot error and you have to reinstall your operating system, its easier to restore it from backup with all the programs […]
If you are running Plex, you’ve noticed that transcoding takes up alot of CPU power. Specially if you’re transcoding 4K videos, which you shouldnt do anyway. Plex removes tone mapping when transcoding 4K HDR, so your movies or TV shows will look bland. Now you want to offset some of […]
Prerequisite Ubuntu 20.04 Ansible installed Ansible is a great tool to automate IT infrastructure. In my case I use it to manage my Linux hosts. Instead of typing one command on each host, I can send one command to multiple hosts, using something called playbook. Ansible playbook is a set […]
Prerequisite Ubuntu 18.04 nginx running A domain – Example.com Let’s Encrypt certificate In this blog post we will configure your website and securing it with SSL using NGINX as a reverse proxy, forwarding traffic to your backend web server. For the sake of simplicity lets that you are you are […]
Prerequisite Ubuntu 20.04 with root access Snort 3.0 up and running with community rules Open App ID Elastic Stack up and running In this guide we will visualize Snort3 logs in Kibana. I’ve setup Elastic Stack as an LXC with 300 GB disk space for storing logs. Elasticsearch consumes alot […]
Follow any guide for setting up bridged network on LXC. Just google it. HOWEVER, if you’ve setup LXC on a VM with bridged network, the hypervisor will BLOCK dhcp requests if you’ve not enabled promiscouse mode on the NIC. In Hyper-V you have to enable mac-spoofing for it to work! […]
First, make sure that root login is permitted on the host. Use your favorite text editor. Inside the config file, set permit root login to yes Restart SSH Service If you have not set a password for root, do it now. Now, if you have not generated an ssh key, […]