Introduction This time round, I’ll share my experience with Security Onion and the journey of setting it up in my environment. I will skip the dull installation process (everyone can click next at the prompts) and rather show you how it fits in my increasingly complex network topology. The focus of this blogpost will be on the interconnection between pfSense, VMWare ESXi and Security Onion. Prerequisites Before reading further on, I’d recommend familiarizing yourself with pfSense and the awesome stuff it can do.
Introduction I do happen to travel from time to time and in order to stay online I have to use insecure public wifi. Everyone who understands a bit about network security knows the risks of connecting to unsafe networks and how dangerous they could be. One of the most common solutions to this problem, including mine, is a VPN service. That’s all great, however, more and more network administrators put effort into blocking VPN traffic.
Introduction Some time ago myself and a friend of mine won these awesome bluetooth Logitech speakers The sound is quite decent, unfortunately connecting to both at the same time is a bit tricky and without having an external bluetooth adapter one could not easily play the same music on both. In this blog post I’ll show you how with a raspberry pi, some clever thinking and a fair amount of patience I managed to stream music simultaneously onto both.
Introduction It’s been a while since my last post. This was due to the fact I was preparing for my interview for Facebook’s 2019 Production Engineering Internship Program as well as doing some uni related work which is not really worth blogging about. Anyway, the good news is that I got that offer from Facebook! I decided this post to be about my overall experience so if you’re looking for technical post, come back next week.
Introduction In this week’s post I’ll share my experince with HAProxy - a high performance TCP/HTTP load balancer Disclaimer: There will be nothing that you can’t read in the haproxy options manual apart from my thoughts. Still, if you’re interested in my experience configuring this application for my setup keep on reading. This post will be shorter than usual because I am a bit low on time since I’m preparing for an important interview.
Introduction In this blogpost I’ll go through the journey I went when I was setting up monitoring with ELK for my website. The task seemed simple - install *beats and tell it to report to my elk stack vm. You’ll see why in my setup it wasn’t as easy as it sounds initially. The issue If you recall my network setup had a little issue - I do not own the public IP address where my infrastructure sits.
Intro As the tittle suggests It’s time to go down infrastructure lane. In this blog post I’ll show my “home” lab and all the services I’ve built so far. I will do my best to keep this up to date so check this post regularly for updates, both to the content and the image at the end. If you are interested in just the network topology, you can find it here Without further due let’s get started.
Intro Recently I’ve been quite busy. I was helping with the organisation of HackConf this weekend which was both awesome and exhausting. Therefore this blog will be covering something simpler - how I created this site. I won’t cover the ceation of the actual ui - it is a statically generated website from markdown files (you can find the sources here). Just google for a static site generator and you’ll find plenty.
Brief intro Recently I’ve been messing around with various client-side web attacks. I’ve noticed that most web devs’ knowledge goes as far as the framework their using requires and that’s it. When asked what is the purpose of a csrf token, they would say - “Oh, it’s something for security and if I don’t put it, my forms don’t work so it must be there.” If you find yourself having a similar answer, keep on reading.