Wednesday, January 27, 2021

Enable SSH 2-Factor Authentication on Ubuntu 18.04

0
Welcome to our guide on how to enable SSH 2-Factor authentication on Ubuntu 18.04 system. Under normal circumstances, we usually login to a remote system with SSH using either a normal username and password combination or a public key. In order to add another layer of security such that you need to verify who you tell the system you are,...

Restrict Access to WordPress Login Page to Specific IPs with libModSecurity

0
In this tutorial, we are going to learn how to restrict access to WordPress login page to specific IPs with libModSecurity. libModSecurity is also known as ModSecurity version 3.0. ModSecurity is an open source, cross-platform web application firewall (WAF) module developed by Trustwave's SpiderLabs. Known as the "Swiss Army Knife" of WAFs, it enables web application defenders to gain visibility into...

How to Install and Configure Squid Proxy on Fedora 29/Fedora 28/CentOS 7

0
Welcome guys to this very tutorial on how to install and configure Squid proxy on Fedora 29/Fedora 28/CentOS 7. Squid is a full-featured web proxy cache server application which provides proxy and cache services for HTTP, FTP, SSL requests and DNS lookups. It also performs transparent caching that reduces bandwidth and improves response time by caching and reusing frequently requested...

Install and Setup Wazuh Server in CentOS 8/Fedora 32

0
In this tutorial, you will learn how to install and setup Wazuh server in CentOS 8/Fedora 32. Wazuh is an open-source tool for visibility, security detection, and compliance. It is a fork of OSSEC HIDS with additional integration with ELK stack and OpenSCAP. The Wazuh stack consists of the Wazuh server (manager), the ELK stack, and the Wazuh agents...

Install Gophish on Ubuntu 18.04/Debian 9.8

6
In this guide, we are going to discuss how to install Gophish on Ubuntu 18.04/Debian 9.8. Gophish is a powerful open-source phishing framework that enables organizations to quickly and easily setup and execute phishing engagements and security awareness training. When a phishing campaign is launched, Gophish updates the results automatically. Using the UI, you can view a timeline for each...

How to Install and Configure DVWA Lab on Ubuntu 18.04 server

2
Hello there, today we are going to learn how to install and configure DVWA lab on Ubuntu 18.04 server. DVWA has been defined as a damn vulnerable PHP/MySQL based web application whose main goals are to aid security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications...

Install and Configure Tripwire Security Monitoring tool on CentOS 8

0
In this tutorial, you will learn how to install and configure Tripwire security monitoring tool on CentOS 8. Tripwire is available is as an open source and commercial version. In this setup, we will learning how to install and setup the open source version of Tripwire. So, What is Tripwire? It is one of the leading Host-based Intrusion Detection tools....

How to Enable Ping response On IBM QRadar SIEM

0
In this tutorial, we are going to learn how to enable the ICMP ping response on QRadar SIEM. So you have installed IBM QRadar SIEM and trying to verify its connectivity using ping command but you realized that ping icmp requests are  being dropped? Well, this happens because by default, QRadar SIEM drops all ICMP traffic received on the management...

Configure Nginx with SSL/TLS certificates on CentOS 8

0
In this tutorial, we are going to learn how to configure Nginx with SSL/TLS certificates on CentOS 8. The use of SSL/TLS certificates ensures secured as well as authentic communications between the web server and the web clients. Configure Nginx with SSL/TLS certificates on CentOS 8 Install Nginx and SSL/TLS module on CentOS 8 In order to configure Nginx HTTP server to...

Creating Custom Nessus Scan Policy Templates

0
Nessus Scan policy template is a set of predefined configuration options related to performing a scan. They define specific actions that are performed during a scan. To create custom Nessus scan policy templates, you need to select the existing templates and modify them to suit your scan requirements. After that, they can be selected from the list of scan...