RSSCategory: SECURITY

How to Setup osquery to Monitor Security Threat on Ubuntu

OSQUERY is an open source tool developed by Facebook for querying various information related to the state of your machines like running processes, loaded Kernel modules, active logged in users, active listening ports etc. This system instrumentation framework make low-level operating system analytic and monitoring both efficient and intuitive. OSQUERY exposes an operating system as […]

May 1, 2017 | By in SECURITY
| Reply More

How to Configure IPsec VPN Using Libreswan

The purpose of IPsec based VPN is to encrypt traffic at the network layer of the OSI model so the attacker cannot eavesdrop between client and the VPN server. In our previous articles on strongswan which is also provides the IPsec protocol functionality on Windows, Linux and Mac OS. However, LibreSwan and OpenSwan tools are […]

April 18, 2017 | By in SECURITY
| Reply More

How to Use GPG Commands to Create Public key for Secure Communication

Let us first try to understand what is encryption. Encryption is a process of embedding plain text data in such a way that it cannot be decoded by outsiders. It is necessary to encrypt data to prevent misuse. The GNU Privacy Guard (GPG) application allows you to encrypt and decrypt information. It is based on the […]

April 4, 2017 | By in SECURITY
| Reply More

How to Setup OpenVPN Access Server on AWS

This article covers how to setup OpenVPN access server using amazon's machine image. OpenVPN is an open source application that uses a VPN method for creating a secure connection between point-to-point OR site-to-site connections in bridged/routed mode. It uses SSL and TLS connections to traverse NAT connections and firewalls. OpenVPN has been ported to embedded […]

February 9, 2017 | By in SECURITY
| 1 Reply More

How to Configure L2TP over IPsec using Freeradius on Ubuntu

Layer 2 tunneling protocol (L2TP) with IPsec  is used to ensure end-to-end encryption because L2TP does not support security features. OpenSwan tool is used to establish IPsec tunnel which will be compiled on Ubuntu distribution. The authentication security feature is implemented using   FreeRadius server. The purpose of authentication server is  to authenticate the user […]

January 3, 2017 | By in UBUNTU HOWTO
| Reply More

How to Setup Vuls Vulnerability Scanner in Linux

VULS is a security vulnerability scanner for Linux. It downloads the NVD (National Vulnerability Database) and inserts into a sqlite database. Vuls has built in CVE dictionary for this sqlite file. The servers are connected using key based authorization, hence we need to generate ssh keys and confirm the authorization between servers and scan target. Since, vuls is an […]

September 27, 2016 | By in SECURITY
| Reply More

How to Install Softether VPN server on Centos 7

Setting up your own virtual private network server is a good way to evade blockage and be able to access sites that are blocked in your country. Choice of open source VPN packages is long but today we decided to try Softether coming from University of Tsukuba in Japan. Softether have long been proprietary product […]

August 25, 2016 | By in SECURITY
| 1 Reply More

How to Setup Volatility Tool for Memory Analysis

In the IT security field, memory or Random Access Memory (RAM) analysis  helps to identify the malicious or illegal activities in the system. RedLine is a free for volatile memory analysis tool which is provided by Mandiant (FireEye company). However, well-known open source security tool for volatile memory analysis is  volatility. It supports analysis of […]

August 12, 2016 | By in SECURITY
| Reply More

Securely Download Files using Https from Nginx Docker Containers

As  system administrators, we have situations where we need to download large files such as backup files, database backups, emails, log files etc securely between our servers. Usually we use SFTP, SSH or SCP for this purposes. But these processes slow down comparatively, when it comes to a remote backup download. In this article, I'm explaining a […]

August 10, 2016 | By in SECURITY
| Reply More

An Ultimate Guide to Secure Ubuntu Host

Ubuntu is termed as the highly secured operating system available but it has flaws in its default install like every other operating system. To remove these weaknesses, IT Security specialist has issued guidelines to combat your system's back-doors/weaknesses and protect you from some of the common Ubuntu exploits. In this guide we will look at few […]

July 29, 2016 | By in SECURITY
| Reply More

How to Install and Use Metasploit Security Tool

According to Rapid7 (company behind the project) web site, Metasploit framework is the World's most used open source penetration testing software. It can be either used for offensive or defensive purposes by hackers.  Metasploit framework is available in many Linux distributions such as Kali (old name Backtrack). However, in this tutorial , Metasploit software will […]

July 11, 2016 | By in SECURITY
| Reply More

How to Setup PKI and Secure Apache Web server

The focus of this tutorial is working of  Public Key Infrastructure (PKI) and OpenSSL based Certificate Authority. Different concept related to  PKI will be explained first and later a test bed using Ubuntu 14.04 LTS will be prepared to apply  PKI knowledge.  In this article, detailed explanation will be given on the generation of certification […]

May 6, 2016 | By
| Reply More

How to Secure CentOS 7 Server with ModSecurity

ModSecurity is an open source web application firewall which enables web application defenders to gain visibility into HTTP traffic and provides powerful rule sets to enhance high security and protection. It provides a full package with real-time web monitoring, logging and access control. The rule sets can be customized and managed according to the user […]

April 21, 2016 | By
| Reply More

How to Setup Public Key Infrastructure (PKI) using OpenSSH

Secure shell, or ssh, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The […]

April 18, 2016 | By
| Reply More