This article demonstrates how to get data out of Active Directory using Ldapsearch. Install the tools: yum install openldap* A simple grab: ldapsearch \ -x -h ad.server.local \ -D “myUserName” \ -W \ -b “dc=company,dc=local” \ -s sub “(cn=*)” cn mail sn The above will get all users within LDAP
Read moreBrowse our Cybersecurity technical articles here. We’re sharing our knowledge with fellow cybersecurity practitioners in the hope that we can all progress further and faster in protecting our information systems.
Install Spamassassin on CentOS & Redhat
This article demonstrates how to install Spamassassin on a CentOS or Redhat server. We’re starting with a working Postfix server. Start by installing Spamassassin with Yum: yum install spamassassin useradd spamd Add the following to the “/etc/postfix/master.cf” file. Add the following to the end of the first non-remarked line: -o
Read moreReset a lost MySQL Password on CentOS and Redhat Linux
Use these instructions to reset a lost MySQL root password. I’ve taken these steps from the website “http://www.rackspace.com/knowledge_center/article/mysql-resetting-a-lost-mysql-root-password”. All credit to them. Note that this is done as the ‘root’ user. First stop MySQL and start it in ‘safe mode’: service mysqld stop mysqld_safe –skip-grant-tables & Now login without the
Read moreInstall security updates only with YUM
This article is a quick description of how to install security updates on a CentOS or Redhat system without installing other normal updates. First install the YUM Plugin: yum install yum-security You can optionally list the available security updates: yum list-security Now you can run the following to install security
Read moreSample Port Address Translation with Redhat/CentOS (/etc/sysconfig/iptables)
This is a sample iptables configuration file ‘/etc/sysconfig/iptables’ on a Redhat server where the server has a single interface and is placed in-front of other systems. In this example, this server (the one with the iptables config below) is infront of a web server at ‘10.0.0.2’. Don’t forget to enable
Read moreSSH Agent Forwarding & Sudo Simplified
This tutorial demonstrates what “SSH Agent Forwarding” is and how it works. We go further to ensure you can ‘sudo’ on the target system. This is the scenario: “You have one or more Web servers that you look after. For security reasons, these Web servers accept SSH connections only from
Read moreExport a list of Full Access Permissions -Microsoft Exchange
The following is a command that will allow you to view all mail boxes that have the Full Access permission enabled in CSV document that you can filter and sort using Excel. This command will filter out the SELF permissions as every user should have Full Access to their own
Read moreExchange – Audit Full Access Permission on Mailboxes
Just recently I have come up against the need to see if a particular user is granting them self the Full Access permission on other users mailboxes. This user might be a new hired administrator or perhaps one that is leaving or even just a compromised account, regardless this is
Read moreConfigure Postfix to relay SMTP to Amazons AWS SES SMTP gateway
We start from a working Postfix configuration. This article will simply show you what needs to be changed in order to use the Amazon SES email relay. In this example we’re using the “email-smtp.us-east-1.amazonaws.com” SMTP relay from Amazon. you should use the one allocated to you. See Amazon’s documentation here.
Read moreUpdate OpenSSL on Ubuntu for the HeartBleed bug
On Ubuntu, issue the following commands to update the lest possible packages while patching the Heartbleed bug. apt-get update apt-get install openssl libssl1.0.0 And then restart any services that need it.
Read more