ELK 5 on Ubuntu: Pt. 3 – Installing and Configuring Beats Agents on Windows Clients

In the previous two posts I went over everything from installing Ubuntu to getting the ELK stack setup and ingesting logs from itself. Now in this final post in the series I am going to cover collecting Windows Event and Continue reading

ELK 5 on Ubuntu: Pt. 2 – Installing and Configuring Elasticsearch, Logstash, Kibana & Nginx

In part one of this series, I went over the basics of installing and configuring Ubuntu 16.04. Now in this part, I am going to take that same VM and go over everything needed to create a functional ELK stack Continue reading

ELK 5 on Ubuntu: Pt. 1 – Installing and Configuring Ubuntu 16.04

In this post I am going to cover the steps needed to install and configure Ubuntu 16.04 Desktop as the base operating system for what is going to become the ELK Stack server. My intention with this first post is Continue reading

Stopping Bots and Website Scrapers from scanning your sites on IIS with URL Rewrite…

Bots and Website Scrapers can be a serious annoyance to anyone who is responsible for administering a website and the more sites and servers you are responsible the more of a problem it can become. Every request a bot or Continue reading

Metasploit Framework basics on Kali Linux – Owning a Windows Server

In this post I want to talk about the basics of using the Metasploit Framework that is included on the latest version of Kali Linux. If you don’t already know the Metasploit Framework is a project that makes writing and Continue reading

Android IP Security Cam with Motion Detection and Recording!

     So I recently switched carriers (Sprint is awesome!) and picked up a Samsung Galaxy Note 2. Surprisingly my previous phone, a Motorola Droid 3, made it the whole 2 yrs and still worked perfectly. Normally I just sell my old Continue reading

IIS 7/7.5 Hardening SSL TLS – Windows Server 2008 R2

     One of the first steps you should do when deploying a new public facing web server is hardening your server’s SSL/TLS connections. Disabling vulnerable protocols, ciphers, hashes and key exchange algorithms can help mitigate the now more common exploits like Continue reading