Zeekurity Zen – Part I: How to Install Zeek on CentOS 8

Zeekurity Zen – Part I: How to Install Zeek on CentOS 8

This is part of the Zeekurity Zen Zeries on building a Zeek (formerly Bro) network sensor. Overview This guide assumes you’ll be installing Zeek on CentOS 8, given how popular CentOS tends to be in the enterprise.  However, the guide should work for any RHEL-based 

How To Build a SANS GIAC Index

How To Build a SANS GIAC Index

One of the keys to passing SANS GIAC exams is to build a comprehensive index to quickly find information during the exam.  Building an index will also help you study as it forces you to thoroughly review the material.  The steps below detail how to 

How to determine your Ring Doorbell Pro firmware version

How to determine your Ring Doorbell Pro firmware version

I have a love/hate relationship with my Ring Doorbell.  When I purchased it in 2016 it worked great for a year with minimal issues.  As it became more popular, I noticed the quality dropped with video freezes, black videos, and missed motion events.  This led 

Palo Alto Firewall: macOS Updates NSURLErrorDomain error -1012

Palo Alto Firewall: macOS Updates NSURLErrorDomain error -1012

This is part of the Palo Posts how-to guides for getting the most from your Palo Alto firewall on a home or small business network. Overview About a month ago, I enabled decryption on my Palo Alto firewall and limited it only to traffic to 

Palo Alto Firewall: External Dynamic Lists

Palo Alto Firewall: External Dynamic Lists

This is part of the Palo Posts how-to guides for getting the most from your Palo Alto firewall on a home or small business network. Overview I recently attended Palo Alto’s annual Ignite conference for the first time.  It was a great experience for learning 

Palo Alto Firewall: Home Network

Palo Alto Firewall: Home Network

This is part of the Palo Posts how-to guides for getting the most from your Palo Alto firewall on a home or small business network. My very own Palo Alto! I’m a big fan of Palo Alto Networks firewalls due to their focus on security 

Seeing Red: The Fun Stuff

Seeing Red: The Fun Stuff

The Fun Stuff: Privilege Escalation, Exfiltration, and Persistence This is part of a series of posts that walk through an attack.  To start from the beginning, click here. In the last post, we successfully exploited our Victim using a client-side attack targeting an old version of Microsoft 

Seeing Red: Exploitation

Seeing Red: Exploitation

Exploitation: Client-side Attack This is part of a series of posts that walk through an attack.  To start from the beginning, click here. In the last post, we performed some basic reconnaissance on our target machine and determined its operating system, running services, and even what browser