Using perl and expect to automate SSH connections.
Using perl to automate ssh login using Net::SSH::Expect module. This tutorial assumes you are using Red Hat or a Red Hat based distro (Centos, Fedora). The script itself will work on any operating system, but installing perl and modules steps may differ from OS to…
CrowdSec – Open Source Security Automation Tool
CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool. CrowdSec is free and…
Create iptables Rules Based on Hostname Using IP Sets
Learn how to use IP Sets and a simple Bash script to update your iptables rules based on a clients hostname or domain name instead of IP address.
Linux Who Command – Display List of Logged In Users
The Linux who command displays list of users that are logged into a system from the terminal or remotely along with other system information.
systemd-tmpfiles – Managing Temporary Files & Directories
Using systemd-tmpfiles services for managing system and user temporary files and directories and creating user specific systemd-tmpfiles configurations.
Brute Force Attacks – Pen Testing Using Hydra and RSMangler
How to use Hyrdra and RSMangler to launch a brute force attack. Penetration testing professionals use these tools for cybersecurity evaluation of a system.
NMap – A Basic Security Audit of Exposed Ports and Services
Learn how to use NMap to do basic scans for open ports. Use additional NMap vulnerability scanning scripts for important security audits.