Posts

Azure CLI: Installing CLI on Mint Linux

Craig Wilson
Azure CLI on Linux Mint Today, I embarked on an exploration of Linux Mint as a potential new desktop environment. Linux Mint stands out as an operating system recognized for its robustness, user-centric design, and unparalleled stability. Its foundation on Ubuntu, which draws from Debian, positions Linux Mint as an exemplary choice for the Linux community. The system’s interface, celebrated for its elegance and simplicity and an extensive software repository, ensures a seamless user experience.

SSL Automation: Azure Resources and Let's Encrypt SSL Certificate

Craig Wilson
Azure Resources and Let’s Encrypt SSL Certificate Automation In the digital age, securing your web applications with SSL/TLS certificates is not just an option—it’s a necessity. Microsoft Azure users have a powerful toolset at their disposal to automate this process, using a combination of Azure resources, Bicep, and Let’s Encrypt. This guide dives into the specifics of setting up Azure resources with Bicep and automating SSL certificate generation and renewal with Let’s Encrypt, highlighting the integration with Azure Key Vault for secure storage of certificates and service principle details.

Hydra: The Simple Guide

Craig Wilson
Hydra: The Simple Guide Introduction to Hydra Hydra, often referred to as THC-Hydra, is a powerful and fast network authentication cracker. It is widely recognized for its ability to rapidly guess or crack login credentials across a wide range of protocols and services. Developed by “The Hacker’s Choice” (THC), Hydra has become an indispensable tool in the arsenal of penetration testers, security analysts, and unethical hackers alike. Why Use Hydra?

Export Certificates in Multiple Formats Using PowerShell

Craig Wilson
How to Export Certificates in Multiple Formats Using PowerShell Introduction Certificates are a crucial part of any IT infrastructure, dealing with secure communications and data protection. Managing them effectively is vital. Today, I am looking at a versatile PowerShell script that simplifies the process of exporting certificates from the Windows Certificate Store in various formats: PEM, PFX, and CER. What Does the Script Do? This PowerShell script allows IT administrators and security professionals to:

NMAP: The Simple Guide

Craig Wilson
NMAP: The Simple Guide Introduction to NMAP NMAP, short for Network Mapper, is an indispensable open-source tool for network exploration and security auditing. Since its initial release in 1997 by Gordon Lyon, NMAP has become a staple in the cybersecurity and IT professional’s toolkit. It excels in scanning large networks rapidly, but it’s equally effective against single hosts. Utilizing raw IP packets in innovative ways, NMAP can discover hosts, services, operating systems, packet filters/firewalls, and numerous other characteristics.

Windows 11 on Unsupported Hardware

Craig Wilson
Installing Windows 11 on Unsupported Hardware: A Guide for Your Test Lab Windows 11 demands specific hardware features for production environments. However, there’s a workaround for experimental purposes. This guide is aimed at those looking to use Windows 11 on outdated or unsupported hardware, typically found in home or development labs. It’s not recommended for production use. During a standard Windows 11 build, once the screen appears to select your langauge, you can press F-10 and open the registry editor(regedit).

Linux Automation with SSH

Craig Wilson
Linux Automation over SSH Linux Automation over SSH, a set of scripts designed for the deployment and configuration of headless Linux workstations and servers. Perfectly suited for creating development servers, this solution has been developed and tested on Raspberry Pi and Ubuntu VMs. It offers a streamlined approach using builtin tools to executing shell scripts remotely, ensuring secure and orderly operations. While it’s a boon for development environments, users are cautioned to handle secure passwords with care before deploying it in production settings.

Damn Vulnerable Web App DVWA testing with ZAP on Kali

Craig Wilson
How to Set Up and Test the Damn Vulnerable Web App (DVWA) Using OWASP ZAP and Docker Web application security is of paramount importance today, with cyber threats becoming more sophisticated. If you’re a web developer, security professional, or a student keen on learning about web application security, this blog post is tailor-made for you. Today, we will guide you through a comprehensive walkthrough on setting up the Damn Vulnerable Web App (DVWA) using OWASP ZAP and Docker, based on a YouTube video tutorial.

Damn Vulnerable Web App DVWA testing with ZAP on Windows

Craig Wilson
Testing Damn Vulnerable Web App (DVWA) with OWASP ZAP on Windows Cybersecurity threats are always evolving, making it vital for developers and security professionals to be updated with the latest tools and techniques. This guide introduces you to using OWASP ZAP for testing the Damn Vulnerable Web App (DVWA) on a Windows 11 environment. Introduction to DVWA The Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application intentionally designed with vulnerabilities.

University Project - Linux Rootkit Development

Craig Wilson
Linux Rootkit Development University Project Introduction Welcome to an intriguing university project video that delves into the secretive realm of Linux Rootkit development. In this project, the focus is on Linux Kernel version 4.4.0 running on Ubuntu 16.04. The goal? To unravel the functionality of a Rootkit and its potential real-world applications. While this endeavor may raise eyebrows, it’s crucial to emphasize that this project is purely for educational and research purposes, with no intention of endorsing or promoting illegal activities.