Let’s say you want multiple LANs, but only have one switch? Or maybe you want to separate your networks into smaller sections, with each one having a different purpose? One for your trusted devices, one for Guest access, one for management, etc. How can you do this? This can be […]
Setting up DHCP with Dynamic DNS (Linux Servers)
Throughout my time tinkering in home lab, I have come across a problem. I am having trouble remembering all these IP Addresses. But thankfully, a solution to this already exists. DNS. However, How can I get my home labs DNS records to update automatically with our DHCP server? We can […]
Deploying Azure Resources using a Bicep Template
In today’s day and age where a lot of companies are migrating to the cloud or having a mix of on-prem and cloud deployments, automating the deployment of infrastructure is essential. Not only does it speed up the time of deployment because you don’t have to waste time clicking around […]
Capturing a Password with Wireshark
In a digital landscape where data breaches and cyber threats are at every corner, the importance of robust cybersecurity practices has never been more important. Today, I will show you how I captured a password using Wiresahrk, a powerful and widely-used network analysis tool. Wireshark, is an open-source packet analyzer […]
Installing PfSense with Virtual Box
In today’s digital landscape, cybersecurity is more important than ever. Cybersecurity has become an increasingly more important concern for organizations and individuals. With cyber threats and new constantly changing vulnerabilities, it is important for you to have a firewall set up if you value your network safety. That’s where PfSense […]
Packet Tracer – Setting up A SOHO Network with 3 Subnets
I made a YouTube video about this. Click here to check it out. If you’d rather read an article, continue below. Networking is a fundamental aspect of modern day technology. Understanding how a network functions is essential for any IT professional. One of the best ways to gain practical experience […]
File Integrity Monitoring – With PowerShell
File Integrity Monitoring is a process of ensuring files are maintaining their integrity. This is to ensure that they have not been changed or tampered with in an unauthorized way. For example, with FIM, you could have alerts sent to you if critical system files have been changed without your […]
Vulnerability Management – Running a Nessus Scan
Today, I used a tool called “Nessus” which is a Vulnerability Management tool. What is Vulnerability Management? Vulnerability Management is a process that involves identifying, assessing, prioritizing, and reducing vulnerabilities in systems, networks, etc. The goal of this is to lower the chances of a security breach or attack by […]
Azure Honeypot & SIEM
During my time studying for the CompTIA Network+ exam, I learned what a SIEM is. SIEM stands for Security Information and Event Management, and is a tool that helps organizations monitor and analyze their security-related data from different sources to detect and respond to cybersecurity threats. In todays world theres […]
Python Encryptor/Decrypter
During my time of studying for the CompTIA Network+ exam last week (I passed), there was a heavy emphasis on keeping everything secure. Encryption, hashing, VPNs, port security, etc. It is insane to me that past protocols and systems just sent information between computers completely naked out in the open. […]