RSSCategory: SECURITY

How to Setup OpenVPN Access Server on AWS

This article covers how to setup OpenVPN access server using amazon's machine image. OpenVPN is an open source application that uses a VPN method for creating a secure connection between point-to-point OR site-to-site connections in bridged/routed mode. It uses SSL and TLS connections to traverse NAT connections and firewalls. OpenVPN has been ported to embedded […]

February 9, 2017 | By in SECURITY
| 1 Reply More

How to Configure L2TP over IPsec using Freeradius on Ubuntu

Layer 2 tunneling protocol (L2TP) with IPsec  is used to ensure end-to-end encryption because L2TP does not support security features. OpenSwan tool is used to establish IPsec tunnel which will be compiled on Ubuntu distribution. The authentication security feature is implemented using   FreeRadius server. The purpose of authentication server is  to authenticate the user […]

January 3, 2017 | By in UBUNTU HOWTO
| Reply More

How to Setup Vuls Vulnerability Scanner in Linux

VULS is a security vulnerability scanner for Linux. It downloads the NVD (National Vulnerability Database) and inserts into a sqlite database. Vuls has built in CVE dictionary for this sqlite file. The servers are connected using key based authorization, hence we need to generate ssh keys and confirm the authorization between servers and scan target. Since, vuls is an […]

September 27, 2016 | By in SECURITY
| Reply More

How to Install Softether VPN server on Centos 7

Setting up your own virtual private network server is a good way to evade blockage and be able to access sites that are blocked in your country. Choice of open source VPN packages is long but today we decided to try Softether coming from University of Tsukuba in Japan. Softether have long been proprietary product […]

August 25, 2016 | By in SECURITY
| Reply More

How to Setup Volatility Tool for Memory Analysis

In the IT security field, memory or Random Access Memory (RAM) analysis  helps to identify the malicious or illegal activities in the system. RedLine is a free for volatile memory analysis tool which is provided by Mandiant (FireEye company). However, well-known open source security tool for volatile memory analysis is  volatility. It supports analysis of […]

August 12, 2016 | By in SECURITY
| Reply More

Securely Download Files using Https from Nginx Docker Containers

As  system administrators, we have situations where we need to download large files such as backup files, database backups, emails, log files etc securely between our servers. Usually we use SFTP, SSH or SCP for this purposes. But these processes slow down comparatively, when it comes to a remote backup download. In this article, I'm explaining a […]

August 10, 2016 | By in SECURITY
| Reply More

An Ultimate Guide to Secure Ubuntu Host

Ubuntu is termed as the highly secured operating system available but it has flaws in its default install like every other operating system. To remove these weaknesses, IT Security specialist has issued guidelines to combat your system's back-doors/weaknesses and protect you from some of the common Ubuntu exploits. In this guide we will look at few […]

July 29, 2016 | By in SECURITY
| Reply More

How to Install and Use Metasploit Security Tool

According to Rapid7 (company behind the project) web site, Metasploit framework is the World's most used open source penetration testing software. It can be either used for offensive or defensive purposes by hackers.  Metasploit framework is available in many Linux distributions such as Kali (old name Backtrack). However, in this tutorial , Metasploit software will […]

July 11, 2016 | By in SECURITY
| Reply More

How to Setup PKI and Secure Apache Web server

The focus of this tutorial is working of  Public Key Infrastructure (PKI) and OpenSSL based Certificate Authority. Different concept related to  PKI will be explained first and later a test bed using Ubuntu 14.04 LTS will be prepared to apply  PKI knowledge.  In this article, detailed explanation will be given on the generation of certification […]

May 6, 2016 | By
| Reply More

How to Secure CentOS 7 Server with ModSecurity

ModSecurity is an open source web application firewall which enables web application defenders to gain visibility into HTTP traffic and provides powerful rule sets to enhance high security and protection. It provides a full package with real-time web monitoring, logging and access control. The rule sets can be customized and managed according to the user […]

April 21, 2016 | By
| Reply More

How to Setup Public Key Infrastructure (PKI) using OpenSSH

Secure shell, or ssh, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The […]

April 18, 2016 | By
| Reply More

How to Install Security Onion 14.04

Did you know Security Onion? It is a Linux distro specialized on network security monitoring and intrusion prevention, simplify the whole network management with a Ubuntu-based distro that you can start using with just few steps. It comes with many valuable security software to monitor your network in realtime or perform analysis on pcap files and/or system logs. Today […]

April 1, 2016 | By
| Reply More

How to Install PSAD on Ubuntu 15.04 LTS

As name indicate, Port Scan Attack Detection (PSAD) tool is used to block port scanning on the server. Nmap, a well-known tool is mostly used for launching port scan to detect open/close ports. PSAD tool continuously  monitors  firewall (iptables in case of linux platform) logs to determine port scan or any other attack occurred. In […]

February 11, 2016 | By
| Reply More

How to Manage Public Key Infrastructure with OpenSSL

OpenSSL is an open source cryptographic toolkit with focus on Secure Socket Layer/Transport Layer Security or SSL/TLS, widely deployed on GNU/Linux systems, it performs key part on our daily experience on the Internet. Today I will point some commands to help you manage X.509 Public Key Infrastructure (PKI) and  also use this toolkit to and encrypt/decrypt files and other […]

January 7, 2016 | By
| Reply More