PFSense – Setting Up OpenVPN on PFSense 2.4.

Setting up OpenVPN on PFSense 2.4.x is a straightforward but rather long process but hopefully this step-by-step guide can give you the direction you need to implement this solution as painlessly as possible. There are 3 primary steps to installing … Continue Reading

Featured Post

GoPhish as a service over SSL on Ubuntu

Recently I needed to setup a GoPhish instance which needed to run as a service and also present its landing page via a fully qualified domain name over SSL. I coouldn’t find a succinct gide which had all the steps … Continue Reading

Featured Post

Ethical Hacking Reconnaissance Plan: Port Scanning with nmap

Port Scanning is the next phase in an Ethical Hacking Reconnaissance Plan and follows on from the footprinting phase. Traditional ethical hacking plans have ‘Scanning’ follow ‘Reconnaissance’ which is quite confusing. The key differentiation to take note of here is … Continue Reading

Featured Post

Ethical Hacking Reconnaissance Plan: Active Footprinting

This post is a continuation of the tools and techniques used during the Ethical Hacking Reconnaissance phase. In the previous post I highlighted the passive footprinting techniques. In this post I will discuss the active footprinting techniques. Active footprinting involves … Continue Reading

Featured Post

PFSense – Suricata 4.0.0 Service Starts and then Fails – Resolved

I recently ran into an issue installing Suricata on PFSense which took some time and a team effort to resolve. To save you time I am posting the resolution here. Symptom Suricata installs without any errors but once you define … Continue Reading

Featured Post

What is Cloud Computing?

Cloud Computing is general term and for all intent and purposes a marketing buzzword. This term is being used holistically to describe a service or system which uses the Internet to provide shared computer processing resources and data to computers … Continue Reading

Featured Post

Removing Crypto-Mining Malware from Windows using SysInternals Tools

I recently had a Hyper-V server commissioned in a data center for a specific project. Unfortunately the engineers who commissioned the server did not install any Windows Updates and ‘secured’ the server with a very weak password. As a result, … Continue Reading

Featured Post

Backup and Restore IIS on Windows Server 2016

The process to backup and restore IIS on Windows Server 2016 is identical to the process used in previous versions of IIS. On the source server perform the following tasks: Backup all Website Files. Export any SSL certificates you may … Continue Reading

Featured Post

Ethical Hacking Reconnaissance Plan: Passive Footprinting

In this post, I am highlighting which sources and tools I use to perform passive footprinting as part of the Reconnaissance phase of an ethical hacking exercise. Passive footprinting involves the uses of tools and resources that can assist you … Continue Reading

Featured Post