We all have our "preferred" or "favored" linux distro we use; mine is CrunchBangPlusPlus (#!++). While it absolutely meets all my day-to-day needs, I really wish it had some of the tools Kali has... Like John the ripper, nmap, hping3, kismet... Just to name a few. Sure, I could go ahead and take a look at the full list, and install each tool individually, but that would be far more time consuming than I would like. Especially when you can go ahead and just add the repositories to your exising Debian-based install. Here's how:

0
0
0
s2sdefault

SO often here at work we need to run the Linux netstat command to get various network details. More often than not, we need to run the netstat command with the -r flag to get routing details. While I am very familiar with the output, I have yet to fully memorize all the route flags and what they mean. Comically enough, there is no article here in our knowledge base that provides this info... So I am putting it up on my website here and now, and will write up an article about it later.

0
0
0
s2sdefault

Early this year, I discovered my server was acting... kinda wonky (details here). In short, I feared that my server had been hijacked for some other, nefarious purposes. After that, I decided to start a forensics analysis, detailed here. 8 months later, after much additional research, I am looking back at my notes and writing up my "final word" on the matter.

0
0
0
s2sdefault

While I have some Checkpoint certifications, and my job title is Network Security Engineer, this does not make me an expert across all firewall products. Certainly, there are many similarities, and there is indeed a lot of transferable knowledge and skills, each product has it own set of unique things. This can vary as widely as how a packet is inspected, the order of NAT vs. firewall rules, etc... I came across a forum post on Sophos' website which I have been referring to quite often. For my own personal notes, I will put the important details below.

0
0
0
s2sdefault

In an earlier article, I "reviewed" 4 different Open Soure UTM (Unified Threat Management) products, and 1 closed source (but still free) product. While not necessarily Open-Source, it still fits well within my "Zero-Cost" Proof-of-Concept. Here I will cover my experiences with actually installing it on an old desktop PC, configuring, and configuring it as a firewall.

0
0
0
s2sdefault