Picture this - you are coming from a database background and getting into the world of IT monitoring or administration. While you are newly warming up to the Linux command line, you have to deal with Windows and Mac machines in your network. Add to that a bunch of Linux servers in your company’s data center.
As a systems administrator, how can you monitor each system’s health, disk space, and metrics? Unfortunately, learning the tools for each OS can be a drag. Many cloud companies offer their dashboard, and those can be helpful, but what about the physical machines in your network? How do you monitor them?
You will need some kind of instrumentation to monitor and take action based on the situation. With big data and high-speed networks and plenty of video-rich accesses, even the terabyte disks can fill up quickly, and you need to take stock of disk overruns, memory, CPU, and network usage. Or in the cybersecurity world, you need to monitor any suspicious activity on your company’s systems.
Topics: cybersecurity, Linux, OSQuery, SQL
Introduction
We have all have heard of network analyzers or packet sniffers, Wireshark with its command-line counterpart Tshark, or tcpdump.
This article explores how Linux's command-line power, combined with the tcpdump lexical parser's filter expressions, can be used for some complex networking debugging. If you are bored at home in these COVID times, how about extracting the video of a video conference capture? (On a serious note, only do this for your video with the participants' permission.)
Topics: Cyber Security, cybersecurity, Network Security, tcpdump
We talked about introductory OpenSSL in a previous blog Dipping Our Toes into OpenSSL, that covered how it supports rich cryptographic-centric operations, which are needed for all sorts of things in the security domain and even outside of it. Today, let's take the next step and understand some of the crypto arithmetic behind it, without making the topic too complicated.
Photo by Vanna Phon on Unsplash
Topics: Cyber Security, cybersecurity, cryptography, openssl
DNS - Do Not think it's Simple
In our recent series of articles, we talked about network security-related tools and techniques one needs to be aware of to build a cybersecurity career. Next, we will cover DNS and its related security implications!
DNS, or Domain Name System, translates domain names to IP addresses, so your browser/s can find what you searched. DNS resolvers are usually stub resolvers, which means that the full DNS records lie elsewhere.
Topics: Cyber Security, cybersecurity, DNSSEC, DNS
Zeek the new Bro
Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review the useful features of Zeek that make it a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog: Bro: Security's Swiss Army Knife.
Topics: Cyber Security, cybersecurity, Bro, Zeek, Security Engineer
To start a career as a security analyst, one must have a good understanding of the network and knowledge of networking tools. Let's begin with netcat.
Topics: Cyber Security, cybersecurity, netcat, Linux
Looking for some top hacking techniques? Read about the most common ones below!
Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/
Topics: Cyber Security, Ransomware, Malware, cybersecurity, Brute Force Attacks, Hacking