Author Archive: ahmad shah

I have basic level experience in Open source tools.

rss feed

How to Configure L2TP over IPsec using Freeradius on Ubuntu

Layer 2 tunneling protocol (L2TP) with IPsec  is used to ensure end-to-end encryption because L2TP does not support security features. OpenSwan tool is used to establish IPsec tunnel which will be compiled on Ubuntu distribution. The authentication security feature is implemented using   FreeRadius server. The purpose of authentication server is  to authenticate the user […]

January 3, 2017 | By in UBUNTU HOWTO
| Reply More

How to Configure IPsec VPN on PfSense Firewall

This article is about securing IP layer using Virtual Private Network (VPN) also known as IPsec (Internet Protocol security) on well-known open source firewall PfSense. Two components of IPsec protocol  are Authentication Header (AH) and Encapsulating Security Payload (ESP) to provide packet integrity, authentication and confidentiality security features. Cryptographic security mechanism are used in IPsec […]

October 10, 2016 | By
| 4 Replies More

How to Install fprobe (Netflow) Tool on IPFire Firewall

This tutorial is about the compilation and installation of NetFlow tool (fprobe) on the IPFire firewall. Fprobe  is libpcap based tool which collects network traffic data and emit output as flows (NetFlow) towards the specified collector. NetFlow protocol supported devices collects all IP traffic and forward the collected data to a server for further analysis […]

September 14, 2016 | By in FIREWALL
| Reply More

How to Compile IPFire Firewall on Ubuntu 14.04

In our previous article we have installed and configured the IPfire firewall on the virtual machine (VM). However, in this article our focus is the compilation of IPfire on the Ubuntu platform. Following could be the reasons of IPfire compilation from source code. Removal/Addition of features Writing new plugins Update packages like Linux kernel Customization […]

August 24, 2016 | By in FIREWALL
| Reply More

How to Setup Volatility Tool for Memory Analysis

In the IT security field, memory or Random Access Memory (RAM) analysis  helps to identify the malicious or illegal activities in the system. RedLine is a free for volatile memory analysis tool which is provided by Mandiant (FireEye company). However, well-known open source security tool for volatile memory analysis is  volatility. It supports analysis of […]

August 12, 2016 | By in SECURITY
| Reply More

10 Best Known Forensics Tools That Works on Linux

Now a days, computer or digital forensics is a very important because of  crimes related to computer, Internet and mobiles. Evidences such as computer and digital devices contain or store sensitive information which can be useful for forensic investigator in a particular crime or incident. Digital forensic investigation required tools to extract desired information from […]

July 20, 2016 | By
| Reply More

How to Install and Use Metasploit Security Tool

According to Rapid7 (company behind the project) web site, Metasploit framework is the World's most used open source penetration testing software. It can be either used for offensive or defensive purposes by hackers.  Metasploit framework is available in many Linux distributions such as Kali (old name Backtrack). However, in this tutorial , Metasploit software will […]

July 11, 2016 | By in SECURITY
| Reply More

How to Setup PKI and Secure Apache Web server

The focus of this tutorial is working of  Public Key Infrastructure (PKI) and OpenSSL based Certificate Authority. Different concept related to  PKI will be explained first and later a test bed using Ubuntu 14.04 LTS will be prepared to apply  PKI knowledge.  In this article, detailed explanation will be given on the generation of certification […]

May 6, 2016 | By
| Reply More

How to Setup Public Key Infrastructure (PKI) using OpenSSH

Secure shell, or ssh, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The […]

April 18, 2016 | By
| Reply More

How to Configure Quagga Routing Suite on Linux

Quagga is one of the core open source project which is used to provide routing services on linux platform. It consist of different components for different dynamics protocols such as  Open Shortest Path First (OSPF),  Routing Information Protocol  (RIP), Border Gateway Protocol (BGP), Intermediate System to Intermediate System (IS-IS) and Multiprotocol Label Switching (MPLS). Partially it […]

February 22, 2016 | By
| Reply More

How to Install PSAD on Ubuntu 15.04 LTS

As name indicate, Port Scan Attack Detection (PSAD) tool is used to block port scanning on the server. Nmap, a well-known tool is mostly used for launching port scan to detect open/close ports. PSAD tool continuously  monitors  firewall (iptables in case of linux platform) logs to determine port scan or any other attack occurred. In […]

February 11, 2016 | By
| Reply More

How to Install and Configure IPFire Firewall

IPFire is an open source firewall distribution. It can be used as a firewall, a proxy server or a VPN gateway.It has following features. Easily configurable Support true random generator High availability Hardware accelerator for cryptography algorithm (AES-NI) IPFire is forked from IPCop and Endian firewall distro's. Installation and basic configuration of firewall is given […]

January 6, 2016 | By
| 2 Replies More

How to Install Tails Security Distribution on USB

In this tutorial, our focus is persistent installation of Tails security distribution on USB stick which is based on Debian GNU/Linux. Tails is a live system which is used to preserve privacy and anonymity  while using internet. It does not left any trace on computer unless explicitly ask by the user. It can be used […]

January 5, 2016 | By
| Reply More

How to Install and Configure Snort on PFsense Firewall

Snort is well-known open source IDS/IPS which is integrated with several firewall distributions such as IPfire, Endian and PfSense. In this tutorial, our focus is installation, configuration of snort and  rules on PfSense firewall. Snort needs packet filter (pf) firewall to provide IPS feature which is also available in this distribution. Installation All software's of […]

December 8, 2015 | By
| Reply More