This article shows how to install and run Nmap using the Vulscan add-on to do vulnerability assessments. Download Nmap: yum install nmap Install the Vulscan.nse script: /usr/share/nmap git clone https://github.com/scipag/vulscan vulscan Run a scan targeting the machine (in this example) “192.168.4.250”: nmap -sV –script vulscan/vulscan.nse 192.168.4.250 My output looks like
Read moreGet help with Linux, Automation, Cybersecurity and more. AGIX staff have the know-how and experience to help your organisation with best-practices, current technology in various Cloud environments including Amazon AWS. Our technicians support Ubuntu, Redhat, Databases, Firewalls, Ansible and Terraform, Storage and more.
This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.
Contact our friendly team to get started.
Nmap with Vulners on CentOS 7 or 8 – A short HowTo
This article shows how to install and run Nmap using the Vulners script to do vulnerability assessments. Download Nmap: yum install nmap Install the Vulners.nse script: /usr/share/nmap wget https://svn.nmap.org/nmap/scripts/vulners.nse Run a scan targetting the machine (in this example) “192.168.4.250”: nmap -sV –script vulners.nse 192.168.4.250 My output looks like this: 22/tcp
Read moreRestore pfSense From Backup Using The CLI (command line)
When all goes bad and you can’t get to the web interface of your Netgate pfSense, you’ll have no option but to try using the CLI (command line). This happened to me recently and this article explains what i did to recover. A few worthy points: The pfSense configuration file
Read moreNetgate pfSense HowTo Video Series
Watch our video tutorial series on setting up your pfSense firewall appliance. We cover VLANs, DHCP, Captive Portals, OpenVPN, IDS/IPS, Transparent Proxy and backups. Watch the introduction video that provides some context to the following series of mini projects. Learn how to create and manage VLAN. We work through
Read moreBasic FreeRadius Setup
This article demonstrates how to install and configured FreeRadius for basic authentication. By “basic authentication”, I mean we’re going to configure local users in clear text. This is the simplest way to configure FreeRadius. We’re installing this on CentOS 8. Install the software: yum install freeradius freeradius-utils Add the client
Read moreRecovering from “sql_exec_internal: sqlite3_step failed: database disk image is malformed” with OpenVAS
If you get the error message “sql_exec_internal: sqlite3_step failed: database disk image is malformed” preventing you from starting or logging into OpenVAS, this article should help. The issue may have been caused by an unexpected power-down, but whatever caused it, the DB is corrupt. Not that this is the same
Read morepfSense as a Transparent Proxy (http & https TLS)
Getting a transparent proxy up and running can be troublesome especially getting it to terminate the HTTPS (TLS) connection, inspect it (if need be) and re-terminate it. Most businesses these days don’t want to actually inspect the traffic but can’t go without some-kind of internet monitoring so a minimalistic transparent
Read moreInstall and Enable Mod_Security for Apache
This article is a short walk-through demonstrating the process of installing and configuring mod_security on Apache. In this tutorial, we’ll be using CentOS 7. We’re starting with a pre-configured and running web server running httpd listening on port 80 and 443. There’s no other services such as Varnishor Nginx running.
Read moreCustom Policy to Allow AWS EC2 Snapshots
This article shows the Jason for a custom IAM policy to allow snapshots with the minimum required access. I bet it can be improved upon but this is pretty close. { “Version”: “2012-10-17”, “Statement”: [ { “Effect”: “Allow”, “Action”: [ “ec2:CreateSnapshot”, “ec2:DeleteSnapshot”, “ec2:Describe*”, “ec2:CreateTags” ], “Resource”: “*” } ] }
Read moreFirewalld Zone Order/Priority And How To Restrict all but one address
This article shows how firewalld priorities rules and zones. The priority of zones is in alphabetical order. So the “block” zone is checked before the “dmz” done. And within a zone, the rules are applied in the order they were added. As we know, rules are in the order they
Read more