Ethical Hacking Reconnaissance Plan: Active Footprinting

This post is a continuation of the tools and techniques used during the Ethical Hacking Reconnaissance phase. In the previous post I highlighted the passive footprinting techniques. In this post I will discuss the active footprinting techniques. Active footprinting involves … Continue Reading

PFSense – Suricata 4.0.0 Service Starts and then Fails – Resolved

I recently ran into an issue installing Suricata on PFSense which took some time and a team effort to resolve. To save you time I am posting the resolution here. Symptom Suricata installs without any errors but once you define … Continue Reading

Ethical Hacking Reconnaissance Plan: Passive Footprinting

In this post, I am highlighting which sources and tools I use to perform passive footprinting as part of the Reconnaissance phase of an ethical hacking exercise. Passive footprinting involves the uses of tools and resources that can assist you … Continue Reading

Hardening WordPress – Robots.txt

WordPress possesses a virtual robots.txt file which means that no actual file is present on the web server, WordPress generates this file each time someone visits your site. A robots.txt file is a good idea to make your site search … Continue Reading

Hardening WordPress – Hiding Directory Listing

A common WordPress configuration error is permitting directory listing or directory browsing as it is also known. Unless you have a specific use case where you have to have directory listing enabled, this should be disabled as it is information … Continue Reading

Hardening WordPress – PHP Configuration

WordPress is written in PHP. In order to properly secure WordPress one needs to ensure that your server’s global PHP settings are configured in a secure manner in order to mitigate any security risks that may exist. In a shared … Continue Reading

WordPress Security – Setting File Permissions

Why Correct File Permission Settings are Important WordPress is a very popular platform for building websites.  WordPress sites could make up anything from 15% to 23% of sites on the Internet depending on where you get your statistics from. This … Continue Reading

Azure Security Center – Setting Security Policies

As per my previous overview post on Azure Security Center, this Azure service provides and overview of the security state of Azure apps and services running on a specific subscription. The power of Azure Security Center is only unleashed when … Continue Reading

Azure Security Center – Getting Started

How safe is my data and how secure are my applications in the cloud? This is one of the first questions many organizations ask when they first start investigating migrating data, applications and workloads to public cloud infrastructure. Securing data … Continue Reading