December 10, 2018

Category: Administration

Docker :: Tips and tricks

This post will be ever evolving as I find more tips and tricks for working with Docker on Windows.  Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]

Docker :: interacting with containers and using dockerfiles

In part 1 to this series we installed Docker and got our very first container off the ground.  In this post, I want to take this a little further and build a new ubuntu image using a dockerfile.  A dockerfile is a file that docker can use to automatically modify an image by running commands, […]

Docker :: Getting start on Windows 10

Recently I was doing some hackery for a project and really struggled getting docker off the ground and serving up a website from within a container.  This particular project was on linux but actually docker can also run on Windows, using the “built in” functionality of Hyper V.  Not one to be defeated I set […]

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]

How to configure a Rotating, long term packet capture using Wireshark.

Introduction Wireshark is an awesome tool for troubleshooting network traffic. Although the Wireshark GUI is not designed for long term packet captures and left running would simply fill the hard drive of the server/pc running the program. Within Wireshark there is a tiny built in Windows command line tool called ‘dumpcap’ which at less than […]

How secure is IEEE802.1x?

I’m a huge fan of deploying “dot1x”.  With very little configuration (a Windows NPS server, a little group policy and some access switch commands) you can authenticate every device that connects to your network.  Unlike MAC based security, dot1x ensures that your devices must be successfully authenticated by a centralised RADIUS server before they are […]

VMWare :: Clone a VM without vCenter

VMWare ESXi is a great free tool for any home lab, but something that is missing is the ability to clone VMs – a feature reserved for customers with vCenter. Well, there is a relatively straight forward process that will enable you to duplicate your VMs and I will show you how in this post. […]

PowerShell :: export DNS zones to a hosts file

Picture the scene!  Your data centre has caught fire so you grab you disaster recovery jump kit and run off to the standby site to start powering things up.  Whether you are using VMware SRM, Veeam replication or block level SAN replication you are going to need to connect to some servers / appliances right? […]

PowerShell :: output email addresses from Active Directory

Hopefully you’ve landed here from my series on macro malware and you need to output a list of all you users email addresses to send them some dummy phishing emails for educational purposes.  If not and you need to output a list of all your email addresses in Active Directory then you’re still in the […]
Page 1 of 212 »

Subscribe to SYNACK via Email