Self Hosting Progress

In January this year, I made the leap and bought a server. Thus began the journey down the road of being completely self-hosted and independent from Google or any other party. Below I will talk about what I have so far, and my future goals. Starting off, I purchased a DELL PowerEdge R610 with 128gb

Getting Started w/ Portainer

Portainer is a GUI for adding and managing docker containers with the option to run Windows containers too. This feature-rich application includes automated startup and recovery, App templates, custom image formatting, and much more. Here, I will guide you through setting up your Portainer instance. To start, spin up a Ubuntu VM, preferably Ubuntu Server

Splunk Common Queries

Quick Commands To see source types: tstats values(sourcetype) where index=winevent_kafka Search by port: index=* source=/nsm/bro/logs/current/conn.log id.resp_h=* id.resp_p=1182 Search by port and host index=* source=/nsm/bro/logs/current/conn.log id.resp_h=* id.resp_p=1182| spath “id.resp_h” | search “id.resp_h”=”192.168.20.217” DNS QUERIES Top 10 Clients by Volume of Requests Capturing spikes or changes in client volumes may show early signs of data exfiltration. tag=dns

Links to Practice

The following links are for practicing Penetration testing, defense practice, and general resources. https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/1546932631/ http://www.amanhardikar.com/mindmaps/Practice.html (big list of practice options) https://www.azcwr.org/ (Very unique opportunity to hack hundreds of VMs) https://www.turnkeylinux.org/ https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ https://information.rapid7.com/metasploitable-download.html https://www.vmware.com/products/esxi-and-esx.html https://www.google.com/search?q=unoffical+esxi+compatibility https://www.vmware.com/products/personal-desktop-virtualization.html https://www.virtualbox.org/ https://www.sans.org/security-resources/posters/pen-testing/pen-test-attack-surfaces-tools-techniques-70 https://ctf365.com/ https://www.vulnhub.com/ https://antsle.com/ https://www.hackthebox.eu/ http://www.dvwa.co.uk/

Kali Linux Links

The following are links pertaining to Kali and update instructions. https://www.kali.org/ https://www.kali.org/blog/ https://www.kali.org/kali-linux-documentation/ https://www.kali.org/download-kali-linux-revealed-book/ https://tools.kali.org/tools-listing How to get the latest version of Kali and keep it up-to-date going forward 1. Download the latest base version from https://www.kali.org/downloads/ 2. Run this (as root) to update, “apt update && apt full-upgrade -y” 3. Reboot Kali, “reboot” If

Networking Protocols

The following are links pertaining to network protocols including cheat sheets and general information. https://en.wikipedia.org/wiki/Communication_protocol https://en.wikipedia.org/wiki/OSI_model https://en.wikipedia.org/wiki/Internet_protocol_suite https://en.wikipedia.org/wiki/IPv4 https://en.wikipedia.org/wiki/IPv6_packet https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol_version_6 https://en.wikipedia.org/wiki/Transmission_Control_Protocol https://en.wikipedia.org/wiki/User_Datagram_Protocol https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol http://packetlife.net/library/cheat-sheets/ (helpful reference cheat sheets)

General InfoSec Links

The following are some links I compiled regarding general InfoSec topics. Your 5 Year Path: Success in Infosec: https://www.youtube.com/watch?v=Uv-AfK7PkxU https://vimeo.com/103717886 (Introduction to Linux video) https://www.google.com/search?q=linux+cheat+sheets (Linux cheat sheets) https://www.microsoft.com/en-us/download/details.aspx?id=56846 (Windows command line reference) https://www.khanacademy.org/math/algebra-home/alg-intro-to-algebra/algebra-alternate-number-bases/v/number-systems-introduction (Introduction to number systems and binary) https://www.khanacademy.org/math/algebra-home/alg-intro-to-algebra/algebra-alternate-number-bases/v/hexadecimal-number-system (Hexadecimal number system) https://cloud-platform-assets.azurewebsites.net/anatomy-of-a-breach/ https://www.nist.gov/topics/cybersecurity https://measurablesecurity.mitre.org/ https://www.nist.gov/topics/cybersecurity https://www.cisecurity.org/ https://www.cisecurity.org/controls/ https://www.cisecurity.org/cis-benchmarks/ https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory (Excellent recommendations for