Automation can save employee and customer time through reduced manual action and reduced errors. The less human interaction required the less likely errors are to occur because a reliable repeatable process has been created. Typing commands into a terminal can suffer from misspelling and commands entered in an improper order. Conversely, too much automation can... Continue reading To Ask or Not to Ask?
(Bourne-Again SHell) If you’re looking for root account and operating system tests, and operator input error handling for your bash script, you’ve come to the right place. The example commands I’m using are from an installation script that I created for my company using if and nested if statements. If statements are a type of... Continue reading A Little Bash
You can use a cache server for a small to medium-sized business no matter the industry or for whatever you would like. A DNS cache doesn’t have to be high maintenance or a menace to other people and organizations as long as you take certain precautions in the configuration. My reasons for creating a DNS... Continue reading Reduce Web Page Load Times and Improve Privacy Control
In order to learn web app exploitation safely (and legally), it is useful to have practice applications to run on your local environment. Damn Vulnerable Web Application (DVWA) was created for just this purpose. DVWA contains many common web vulnerabilities such as SQL injection, XSS, and more that allow you to hone your web hacking... Continue reading Installing Damn Vulnerable Web Application (DVWA) Using XAMPP in Kali Linux
Once data starts flowing through the sniffing interfaces you are going to be presented with a lot of false positives. It’s essential to reduce the number of false positives because the identification of real indicators can become next to impossible and your hardware will thank you. When I fired up Security Onion on Ubuntu 16.04... Continue reading Security Onion Set Up Part 4: Tuning