Deb7x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 7x implementation
- Features Discussion and Various Installations
- Enumerate relevant features
- Discuss platform support
- Installation preparation
- Obtain relevant ISO image
- Prepare VMWare environment to support Debian
- Install and evaluate
- Update network configuration
- Prepare environment for rapid implementation
- Clone instance and modify accordingly
- Evaluate cloned resource as needed
- Prepare Debian for Xen VM installation
- Provision resources for Xen
- Install on Xen as HVM and evaluate
- Basic Debian GNU/Linux Skills
- Explore usage of the following useful commands
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, tty
- cat, file, chmod, chown, history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, kill
- less & more, head & tail, find
- stat, which, w, who
- dig (Domain Information Groper) - used to query DNS servers
- Tar and compression utilities with tar|gzip|bzip2
- Use checksum programs to confirm content integrity
- Explain UNIX/Linux file security & permissions
- Symlinks | Hard Links | Soft Links | Special Bits
- Storage Management
- Explore disk topology with FDISK
- Provision EXT4 File Systems as needed
- Provision additional Storage partitions using Parted
- Provision additional Swap storage
- Use MKSWAP & SWAPON to enable additional Swap storage
- Update File System Table (FSTAB) to reflect system changes
- Explore Logical Volume Management (LVM) Configuration
- Create volume sets using: Logical Volume Management (LVM)
- Package Management
- Explain classes of Debian GNU/Linux Packages
- Identify Debian GNU/Linux Package Management Tools
- Inventory currently installed DEB packages
- Identify key Advanced Package Tool (APT) configuration files
- Search for Debian GNU/Linux packages using Advanced Package Tool (APT)
- Install/Update/Remove software using APT
- Configure APT to query multiple sources for packages
- Peruse package repository using 'dpkg'
- Configure APT to install packages from varying versions of Debian GNU/Linux
- Use Aptitude to manage Debian GNU/Linux packages
- Discuss various package management options
- Explore package management repositories
- Use DPKG to install a .deb package
- Install packages using 'apt-get'
- Manage packages using 'aptitude'
- System Control
- Peruse key directories used by Kernel
- Discuss hierarchy as applied to functioning system
- Identify supported settings
- Influence settings real time and evaluate
- Committ settings for persistence
- Confirm persistence of directives
- Discuss various possible system tweaks
- Screen TTYs | PTYs
- Discuss TTY | PTY limitations
- Identify opportunites to benefit from Screen
- Identify configuration environment
- Invoke and use screen natively
- Confirm persistence of TTYs | PTYs across sessions
- Share Screen sessions
- Confirm overall efficacy of Screen
- Explore the CRON scheduling daemon & configuration
- Identify key Cron configuration scopes (Global & User)
- Explain Crontab file format and applicable options
- Define global cron jobs
- Define custom cron jobs user-wide
- Evaluate results of cron jobs
- Core Network Services
- System Logging via RSyslog and Logrotate
- Discuss Syslog Facilities | Levels
- Explore default configuration
- Receive Syslog data via network
- Mirror Syslog log as needed
- Trap Infrastructure device logs and evaluate
- Explore log rotation and customization via Logrotate
- Discuss key log rotation use cases
- Configure Logrotate to rotate sample log files
- Evaluate results
- Common Network Utilities
- PING
- TELNET
- NETSTAT
- ARP
- TRACEPATH
- DIG
- Interface Configuration
- Explore network configuration tree
- Alter settings and evaluate
- Provision aliased interfaces as needed
- Confirm communications via various interfaces
- Committ configuration for persistence
- Provision interface configuration on various nodes
- Evaluate accordingly
- RSYNC Transmissions
- Discuss features and benefits
- Generate and move data between nodes as needed
- Confirm results
- Explore various rsync options
- Synchronize content as needed
- Evaluate rsync applicability
- Network Time Protocol Configuration
- Discuss applicability
- Install and explore default configuration
- Re-configure environment to suit internal requirements
- Confirm ntp strata assignments
- Ensure time synchronization across nodes
- Very Secure File Transfer Protocol Daemon (VSFTPD)
- Explain features and applicability
- Peruse default configuration
- Test anonymous FTP connectivity
- Secure configuration per general requirements
- Use various FTP clients to communicate with VSFTPD
- Enable local user access
- Jail users to $HOME - added security
- Evaluate results
- BIND Domain Name Server - DNS Implementation
- Implement BIND 9x
- Configure BIND as a caching-only DNS server
- Test caching-only name resolution from various nodes
- Configure primary DNS services
- Replicate primary content to secondary DNS node
- Confirm replication information
- Disable primary and evaluate secondary behaviour
- Vary TTLs of records and evaluate responsiveness
- Configure reverse DNS zone - IPv4
- Provision forward and reverse IPv6 records
- Confirm IPv[4|6] record resolution
- Windows Integration via Samba
- Explore default Samba footprint
- Use Samba clients to ascertain NETBIOS (SMB|CIFS) information
- Install Samba Server
- Configure User-level security and evaluate access
- Provision bridge user and test access
- Rationalize ineffectiveness of User-level security
- Contrast User | ADS security levels
- Install ADS support via Winbind and Kerberos
- Install Samba SWAT for streamlined web-based administration
- Connect Samba node to Active Directory Services (ADS)
- Confirm enumeration of ADS resources
- Test connectivity via: NETBIOS and SSH
- Evaluate results
- System Logging via RSyslog and Logrotate
- Apache HTTPD - Web Services
- Implement Apache Web Server
- Explore configuration hierarchy
- Discuss key directives
- Peruse Apache logging templates and defaults
- Vary logged information as needed
- Provision IP-Based Virtual Hosts (VHosts)
- Confirm distinct IP-Based connectivity to various sites
- Contrast IP-Based sites with default sites
- Conserve IP resources with Name-Based VHosts
- Contrast various VHost types
- Secure communications with Apache SSL | TLS
- Test connectivity to various SSL|TLS-enabled sites
- MySQL Installation | Administration
- Install MySQL Relational Database Management System
- Explore default client | server environment
- Use Terminal Monitor Client to ascertain DBMS details
- Secure DBMS - Remove superfluous accounts
- Create simple MySQL database with 'mysql' and 'ssh'
- Install PHPMyAdmin for web-based management of MySQL
- Use PHPMyAdmin to ascertain DBMS details
- Test connectivity as various users
- Explore PHPMyAdmin's interface
- Evaluate accordingly
- PHP Intro | CLI Script
- Explore default implementation
- Ensure proper PHP stack is installed
- Expose useful debug variables - Apache | PHP
- Write simple data copy CLI script - normalize file delimiters
- Evaluate results
- Postfix MTA
- Install Postfix MTA
- Introduction to Postfix Message Transfer Agent (MTA)
- Use Mutt to demonstrate outbound mail handling using Postfix
- Explore Postfix Configuration
- Post Office Protocol Version 3 (POP3)
- Explain POP3 concepts and applications
- Implement POP3 daemon
- Test basic $SHELL-based connectivity
- Use Mutt to send SMTP-based messages to POP3 account
- Configure MUA to interact with POP3 server
- Contrast clear-text and encrypted communications
- Internet Messaging Access Protocol (IMAP)
- Contrast IMAP with POP3
- Install IMAP server
- Fetch mail from IMAP server and evaluate
- Confirm secure communications
- Web-based Mail Implementation using Squirrel-mail
- Describe required squirrel mail components for web-mail integration
- Install squirrel mail on Debian GNU/Linux system
- Configure Apache virtual directory for squirrel mail integration
- Configure Apache Virtual Host for squirrel mail integration
- Configure BIND DNS services for squirrel mail integration
- Explore squirrel mail's web-based interface
- Improve Security Posture
- Update and Upgrade install Packages
- Identify changes across Nodes
- Secure content with GNU Privacy Guard (GPG)
- Explore benefits of various Secure Shell clients
- Peruse Secure Shell Server security
- Disable superfluous services
- Explore and tighten System Policy
- Login Definitions
- Evaluate Results
- NMap Security Scanner
- Obtain, compile and install current version of NMAP
- Identify commonly used NMAP options/switches/parameters
- Perform default TCP SYN-based ethical scans of local and remote resources
- Explain typical TCP handshake protocol while using NMAP
- Perform default TCP Connect-based ethical scans of local and remote resources
- Peform local ethical scans
- Identifiy key NMAP configuration files
- Use NMAP to perform operating system fingerprinting and versioning
- Peform subnet-wide ethical scans
- TCPDump Introduction | Usage
- Identify key tools
- Use TCPDump to capture traffic
- Apply Berkeley Packet Filters accordingly
- Capture and analyze traffic with Wireshark
- Evaluate Results
- IPTABLES (Netfilter Linux Kernel-based Firewall)
- Discuss features and benefits
- Explore IPTABLES default chains/filters and policies
- Filter traffic as desired
- Log filtered traffic and evaluate
- Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information
- Summarize rules with filtered groups of interesting traffic
- Restrict access to various daemons (SSH/FTP/HTTP/etc.)
- Test connectivity locally and remotely
- Ensure rules persistence across restarts
- Secure Key Services
- Identify remaining services
- Generate SSL | TLS Usage Keys
- Configure FTP Server with SSL | TLS
- Test secure communications with LFTP and FileZilla
- MySQL with Secure Shell Security
- MySQL with SSL | TLS Security
- Evaluate Results
- Snort® NIDS Introduciton | Usage
- Discuss features and benefits
- Explore online sources
- Install Snort Network Intrusion Detection System Packages
- Use Snort to intercept interesting traffic as Sniffer
- Log for archival purposes
- Apply BPFs as needed
- Parse captured traffic with common tools
- Explore NIDS configuration mode
- Evaluate results
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Sums Edition
Details
Release Info
Checksums ensure data-integrity, at-rest, cross-transit, and ultimately at-rest. Use them to verify Content as needed.Release Syllabus
Sums
- Various Tools
- Remote Confirmations
- File Metadata
- File Fragments
- Compress Content
- Archive Content
- DIR Hierarchy
- Password Sums
- Shared Secret
- Restrict History
- Downloaded Content
- Encrypt Content
- Site Credentials
- Site COOKIE
- Site COOKIE - Unique
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism