VLANs act as logical segmentation within our network, letting us group our device(s) based on their functionality or department requirements. In this lab, we’ll use the following VLANs: Entering Configuration Mode Once logged in via terminal, enter privileged exec mode by typing: Create the VLANs Once we’ve entered configuraiton mode we can create each VLAN […]
Read moreTCP/IP and OSI layers
Both the OSI and TCP/IP models provide a framework for understanding networking, there are some key differences, between them. The OSI Model has seven distinct layers, and is more theoretical and structured while the TCP/IP framework is more practical and streamlined, with four layers and is used in actual networking as opposed to being a […]
Read moreNetwork Scanning with Nmap
Nmap is a powerful tool for network exploration and security auditing. It can be used for various tasks, such as host discovery, port scanning, OS detection, and vulnerability detection. In this guide, we’ll do a simple penetration test to find vulnerabilties on our test network 192.168.0.1. We don’t have any IPS / Intrusion Prevention System […]
Read moreAutomating CIS Compliance With OpenScap on Ubuntu Server
OpenScap is a tool that allows you to scan and audit your system for compliance with various security standards, such as CIS (Center for Internet Security) benchmarks. In this blog post, we will use OpenScap to deploy CIS standards on Ubuntu Server 23.04, the same steps can be used with other flavors of Linux such […]
Read moreHow to Protect Yourself from Outlook Vulnerability CVE-2023-29325
CVE-2023-29325 is a critical vulnerability that could allow attackers to execute malicious code on your computer through an exploit in Outlook. Microsoft has released a security update to fix this flaw as part of its May 2023 Patch Tuesday. What is CVE-2023-29325 and how does it work? CVE-2023-29325 is a remote code execution (RCE) vulnerability that […]
Read moreHow to protect yourself from Windows NFS vulnerability CVE-2023-24941
CVE-2023-29325 is a critical vulnerability that could allow attackers to execute malicious code on your computer through an exploit in Outlook. Microsoft has released a security update to fix this flaw as part of its May 2023 Patch Tuesday. What is CVE-2023-29325 and how does it work? CVE-2023-29325 is a remote code execution (RCE) vulnerability that […]
Read moreVMWare ESXI Step-By-Step installation guide
VMWare ESXi is a powerful virtualization platform that enables users to create and manage multiple virtual machines on a single physical server. The platform provides a variety of features and capabilities, including resource management, security, and high availability. This blog gives an overall guide, from verifying hardware compatibility to creating virtual machines on the VMWare […]
Read moreHow to Create ESXi Installation Media with Rufus
Are you planning to deploy ESXi on your server or computer system? To get started, you’ll need a bootable USB drive or CD/DVD with the ESXi installation media or ISO file. Rufus is a free and open-source tool for creating bootable USB drives. It is easy to use and supports various operating systems and installation […]
Read more