Introduction In this blog post, we’ll guide you through setting up SSH key-based authentication between two Linux virtual machines (VMs). This secure and efficient method allows you to connect to your VMs without the need for passwords, enhancing both security and convenience. We’ll be using two VMs in this example: Things we need Step 1: […]
Category: Security
Active Directory Home Lab
Purpose of the Home Lab The Active Directory Home Lab provides enthusiasts and professionals with a platform to gain hands-on experience in deploying, configuring, and managing Active Directory services in a controlled environment. By simulating real-world scenarios, users can enhance their skills in network administration, security, and system integration. What I did in this lab […]
Port Scanning Analysis with Banner Grabbing
Banner grabbing is like reading a welcome sign when connecting to a computer. It tells us what services, like a website or server, are running and their versions. Port analysis is like checking which entry points, or ports, are open on a computer. This helps us understand and secure the network by identifying potential vulnerabilities. […]
Log Analysis with Bash Script
This time, I created a bash script to analyze web server access log. Step 1: Create a new folder using mkdir mkdir log_analysis_folder Step 2: Move into the new folder cd log_analysis_folder Step 3: Create a new bash script using vi vi log_analysis_script.sh I created few variables to find unique ip address, total number of […]
Automating SSH Service With Bash Script
Recently, I set up a new virtual machine on my laptop and, as usual, encountered the hassle of enabling the SSH server. Tired of repeating this process, I decided to craft a Bash script that would handle everything from installing the server to starting or restarting it. To achieve this, I used vi editor to […]