Honeypots are used to help security reseach to gather infromation, about threats in thier internal network or in the wild. In this tutorial we look at configuration errors that could help an attack, attack computer using the honeypot as a base
Tutorial on how to capture network traffic on a remote server and have them displayed in wireshark on your local machine.
This is a short overview of extending pyminifakeDNS.
This is a short overview of how to create a python script, to take a screenshot and then securely upload it to your server through ssh.
A perl script to help gather more information about the attacks of your kippo honeypot by mapping thier IP Address back to the country code.
A short tutorial that goes about to show you how to write a small script to anaylser SSH login attempts that are written to the auth.log. The Information you learn here can be used across different types of logs.
In a previous tutorial we showed how to secure you web browseing by tunneling your trafic through ssh using a socks5 proxy. In this tutorial we show you how to verify if you tunnel is secure, and that you are not leaking any dns request.
It is not always fun altering and finding files through the command line. In this tutorial we show you how to mount remote folders useng ssh to they appear as if they are stored on the local machine.
Screen is the ultimate replacement to nohup. Screen allows you to keep running commands over a ssh session even if you session drops. It also allows for multiple sessions to be run and switching can be performed through Screens hotkeys. One excellent feature of screen is if two users are logged in they can connect to the same session allowing both uses to interact. This is an excellent utility that you should take advantage of if you working at the command line.
This tutorial was written in October 2010, and posted to the hak5 forums in reply to Episode 808. If you want more background information i would suggest watching that Episode of Hak5.
Instruction on how to encrypt your web traffic through a SSH server, on linux and windows with the most popular web browsers.
Guilherme shows us how to reuse existing ssh connection with version 4.X of OpenSSH.
Tutorial on how to install Kippo the ssh honeypot.
reverse ssh to get past those pesky firewalls.
In this tutorial we will show you how to set up a welcome banner and login message to all the users that log in through ssh.
Following Guilherme first tutorial on blocking tor access to BSD servers useing PF. He follows up by showing us how to block Tor access using IPTables, and has even writen us a automated script that will update the tor nodes.
In this tutorial Guilherme shows us how to block tor users from access our BSD servers using PF.