Download Kali: https://www.kali.org/downloads/
Basic Configuration Videos:
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.
Download Kali: https://www.kali.org/downloads/ Basic Configuration Videos:
0 Comments
IT operations are the processes and services administered by an organization’s information technology department. As such, IT operations include administrative processes and support for hardware and software, for both internal and external clients.
IT OPS Knowledge Points:
DevStack is an opinionated script to quickly create an OpenStack development environment. It can also be used to demonstrate starting/running OpenStack services and provide examples of using them from a command line. This post is going to present the steps how to install DevStack into a VMware workstation Ubuntu VM.
Youtube Video: 1. Prepare Ubuntu VM This Ubuntu Virtual machine will need at least 12G memory and 100G hard drive. I have given my OpenStack VM 16G memory and 120G hard drive for testing.
Here are some scripts and methods to do remote troubleshooting or running some commands in remote machines. I found they are very useful especially in a enterprise environment if you have your domain admin account. Prerequisites to run remote commands:
The CentOS (Community Enterprise Operating System) Project is a community-driven free software effort focused on delivering a robust open source ecosystem. For users, CentOS offers a consistent manageable platform that suits a wide variety of deployments. For open source communities, CentOS offers a solid, predictable base to build upon, along with extensive resources to build, test, release, and maintain their code.
CentOS uses the Red Hat source code base to create a product similar to RHEL. So CentOS is very close to being RHEL without the branding and support. In particular, the library versions are the same, so binaries that work on one will work on the other. The administration tools are the same and configured in similar ways. However, there are a few differences, as the two distributions sometimes apply different minor patches.
Gartner has named Proofpoint (Wombat Security) aLeader in Security Awareness Computer-Based Training for a couple of years as far as I could find.
There are many functions and features I like, but one thing I specially liked is how easy you can setup a training just with a couple of clicks and some basic information entered. The templates from Wombat is already good enough for most situations. In this post, I captured some screenshots to show how easily it can be done. 1. Log into Wombat Platform Products->Training -> Assignmetns
Based on Wikipedia, PyCharm is an integrated development environment (IDE) used in computer programming, specifically for the Python language. It is developed by the Czech company JetBrains. It provides code analysis, a graphical debugger, an integrated unit tester, integration with version control systems (VCSes), and supports web development with Django.
PyCharm is cross-platform, with Windows, macOS and Linux versions. The Community Edition is released under the Apache License, and there is also Professional Edition with extra features, released under a proprietary license. This post and related YouTube video will show you the step by step installation. 1. Download Free Community Version From download URL: https://www.jetbrains.com/pycharm/download/#section=windows, we will get a 212MB file : pycharm-community-2018.3.2.exe.
Here are some collections from Internet about Threat Hunting tools, information and resources.
1. Kansa
|
|