This article demonstrates how to extent a LUKS encrypted volume. We’re using Ubuntu 22.04 and the volume is non-root. Although you could probably do the same on the root volume (partition). This is risky and you should not do this without a backup and understanding the likelihood of failure. This
Read moreBrowse our Cybersecurity technical articles here. We’re sharing our knowledge with fellow cybersecurity practitioners in the hope that we can all progress further and faster in protecting our information systems.
Deleting the Bash History
There are times when you want to clear out the Bash history and make a clean start. Or perhaps you want to remove a single or select item/s from the Bash history. Both of these scenarios are accomplished as described below – although we’ll focus on clearing out the entire
Read moreCreating and Mounting Luks on boot
This article explains how to mount a Luks volume (encrypted) on boot. You’ll be asked for a password. There’s plenty of articles explaining how to do this with a crypt-key available, so I need not repeat their work. Here’s our scenario. Remember, this process is destructive. Follow this only in
Read more
Windows 10/11 Minimum Security Settings to Check
This article is a check list of the critical items to check to ensure your computers are baseline secure. Of course, baseline is something you should determine, not me. Here;s a quick list. You may be able to use InTune to manage these items and more. Windows Updates Make sure
Read moreEnforcing 2FA Defaults on Azure and Enforcing on Office 365
This article demonstrates how to enforce 2FA for users of Azure and Office 365. Depending on your license levels, you may not get all the settings that Microsoft article recommend, so this article covers the bare minimum. Microsoft has an overarching enforcement settings which needs to be set (although it
Read moreCreating New Users & Placing SSH Keys on Ubuntu and CentOS/Redhat
This is a simple reminder to those creating user accounts on Linux systems with the expectation that the intended user will be able to log in using their SSH keys. There’s also instructions on adding them to the “sudoers” groups. Ubuntu & CentOS/Redhat Create the user and place their SSH
Read moreCybersecurity Staff Training Session – Part 1
Welcome to the first part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Cybersecurity relates to people as much as organisations, and as such we’ll ensure home and work perspectives are covered. We discuss the methods and solutions, and we discuss what to look
Read moreCybersecurity Staff Training Session – Part 2
Welcome to the second part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Organisationsare under constant attack. Some attacks are “testing the water” while others are organized, local and effective. Organisations are constantly defending against cyber-threats. Targets All organisations are targets: Online businesses. Physical
Read moreHide Apache and PHP Version Details
Sometimes we don’t want the public knowing the versions of Apache and PHP running on our servers. This article shows how to hide that information. We’re using CentOS 7 for this example but the only difference really is the location of the configuration file for the Vhosts. Hide the Apache
Read moreMy Most Used Metasploit Modules
The modules that we use are specific to our needs. But these are the most commonly used from my recent history. This list is super generic and mostly to supplement my poor memory. These methods/modules rely on a previously completed db_nmap scan. So our targets are readily available from the
Read more