Monitoring systems or how to get lost in fierce madness. There are many solutions to monitor systems and most of them have some kind of web interface to operate. Choosing the right tool for any job is a tedious task and for a newbie like me it is a bit harder, specially for a sensitive […]

Monitoring Systems (One)

Why FreeBSD
In the following lines you will find a brief but sort of complete explanation about what is FreeBSD and why FreeBSD might be of your interest. If you are already a Mac or Linux user this could be more relevant for you than you would imagine. Enjoy. FreeBSD is an operating system, a unix-like operating […]

How to analyze suspicious email
Millions of emails are sent and received every day. Most of them are just junk. And many among those are potentially harmful. Phishing still is one of the most effective ways for malicious actors to penetrate into well secured networks. The weakest link, too often, is the human factor. Training can help mitigate this 24×7 […]

How to find vulnerabilities in your WordPress with WPScan
Vulnerability scanners are useful tools for administrators and security analysts alike. For the casual WordPress user tools like WPScan may look excessive and complicated for their knowledge, they just need their blog, web page, whatever they’re doing up and running. Any complex administration bothers them to the max, and there are good and valid reasons […]

How to install Apache in FreeBSD with ports
Or better said, how to install Apache the hard way. As mentioned before and many other times FreeBSD has two ways to install software. The easy one which is provided by the pkgng tool. And the not so easy one, ports. With ports you compile the programs and you can set the options the way […]

Abandon Linux. Jails for developers.
Reading the title you might think I want to put developers in Jail and although some may be good candidates this is in the far opposite of my intention. I am talking about FreeBSD Jails. For the unfamiliar with the concept those Jails are userland secure contained environments that share a common kernel. Purists and […]

How to detect a WAF – Web Application Firewall
From a penetration testing perspective to identify if a Web Application Firewall (WAF) is in place is essential. The next question is, does an administrator need to know this? My view is, anyone who is in charge of any system that has implemented some sort of WAF needs to verify this tool is working, at […]

How to manage site visitors based on IP Geolocation
Whenever someone publishes a website on the internet, most of the times, their intention is that site to be seen around the globe. However, as a site administrator you may want to divert users from one country to visit some specific version of that site, maybe because of the visitor’s language. Other times, less often […]

How to secure the ELK stack on CentOS 8
This is a follow up of the ‘how to install the ELK stack on CentOS 8’. That is a basic setup with no security at all. There is no encryption, no username and password setup, nothing. Not even firewall rules to filter ports. And as it’s known security can’t only rely on one factor but […]

How to patch OpenSSH in FreeBSD 12.2
The default version of OpenSSH in FreeBSD 12.2 today, and it’s been this for quite some time, is not the most recent published by the OpenBSD guys, which by the way are the ones developing OpenSSH. Not only is not the latest but it has a few vulnerabilities affecting it, medium risk ones but nevertheless […]
