GOAD v2 Installation

This entry is part 3 of 3 in the series Attack and Defend Active Directory

Views: 116Game Of Active Directory The following steps explain the procedure to setup the GOADv2 LAB environment to pentest Active Directory. Warning This lab is extremely vulnerable, do not reuse recipe to build your environment and do not deploy this environment on internet without isolation (this is a recommendation, use it as your own risk). This … Read more

DFIR: Core Windows Processes

Forensics_001
This entry is part 2 of 18 in the series Incident Response and Forensics

Views: 27Reference: TryHackMe Room “Core Windows Processes” Core Windows Processes Understanding how the Windows operating system functions as a defender is vital.  Task Manager doesn’t show a Parent-Child process view. That is where other utilities, such as Process Hacker and Process Explorer, come to the rescue. Process Hacker Process Explorer Command-line equivalent of obtaining information about the running … Read more

Remotely Upgrading Wazuh Agents – CLI Method

This entry is part 1 of 5 in the series Wazuh - SIEM and XDR

Views: 60To upgrade agents using the command line, use the agent_upgrade tool as follows: List all the agents with outdated software: [root@wazuh-server wazuh-user]# /var/ossec/bin/agent_upgrade -lID    Name                                Version                   001   zyberpatrol-pdc                     Wazuh v4.7.1    Upgrade the agent with ID 001 using the ‘-a’ parameter followed by the agent ID: [root@wazuh-server wazuh-user]# /var/ossec/bin/agent_upgrade -a 001 Upgrading… Upgraded agents:       Agent 001 upgraded: Wazuh v4.7.1 … Read more

L4 – L7 Load Balancing

This entry is part 3 of 3 in the series F5 Local Traffic Manager (LTM)

Views: 41 Load Balancers Despite the name, a Load Balancer does not only balance the load: some of its core functionalities are: L4 to L7 Network Services Definition L4-L7 Network Services Definition are a set of functions such as: load balancing, web application firewalls, service discovery, and monitoring for network layers within the Open Systems Interconnection (OSI) model. … Read more

BIG-IP LTM: Deployment Models

This entry is part 2 of 3 in the series F5 Local Traffic Manager (LTM)

Views: 40Deployment Methods One-Arm Deployment In one-arm deployment, the load balancer is not physically in line of the traffic, which means that the load balancer’s ingress and egress traffic goes through the same network interface. Traffic from the client through the load balancer is network address translated (NAT) with the load balancer as its source … Read more