October 19, 2018

Category: Administration

How To :: Integrate GNS3 with EVE-NG and Physical Equipment

Last year I wrote an article about EVE-NG and how it could be leveraged to create virtual networks. It’s rich feature-set and device support closely matches that offered by GNS3 and Virl, making it a strong contender for the go to simulator for creating virtual networks.  A couple of weeks ago curiosity got the better of […]

Docker :: Tips and tricks

This post will be ever evolving as I find more tips and tricks for working with Docker on Windows.  Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]

Docker :: interacting with containers and using dockerfiles

In part 1 to this series we installed Docker and got our very first container off the ground.  In this post, I want to take this a little further and build a new ubuntu image using a dockerfile.  A dockerfile is a file that docker can use to automatically modify an image by running commands, […]

Docker :: Getting start on Windows 10

Recently I was doing some hackery for a project and really struggled getting docker off the ground and serving up a website from within a container.  This particular project was on linux but actually docker can also run on Windows, using the “built in” functionality of Hyper V.  Not one to be defeated I set […]

KT Labs EP5 :: ACS to ISE Migration

In the video, I show you how you can leverage the ACS to ISE migration tool to migrate objects from ACS to ISE. As mentioned in the video, a few prerequisites need to be met, these are listed below. Prerequisites Direct connectivity to both the ACS and ISE platforms The correct version of ACS (see […]

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]

Cisco :: ASA to FTD Migration Tool

  In this article, I will demonstrate how to leverage the Firepower Management Center (FMC) to covert Adaptive Security Appliance (ASA) configurations to Firepower Threat Defence (FTD) configurations.  Using the ASA to FTD migration tool can save ample amounts of time, especially if you wish to carry over ASA ACLs and NAT rules. Before I get […]

Cisco :: Configure ASAv To Use Virtual Serial Ports

In this article, I will demonstrate how to configure the ASAv so that you use a virtual serial port. This article assumes that you have installed the virtual Cisco Adaptive Security Appliance using VMware workstation or it’s equivalent and that you can only access the ASAv CLI via the VMware client. By default, the virtual serial […]
Page 1 of 3123 »

Subscribe to SYNACK via Email