EL-3x Edition
Details
Release Info
RedHat Enterprise Linux (RHEL) is a mature, and, stable Linux distribution. As its name (Enterprise) implies, its emphasis surrounds slow-and-steady updates, allowing your organization to plan accordingly. In this release, we explore some of the salient 'talking-points' surrounding RHEL.Release Syllabus
RedHat® Enterprise Linux Version 3x
- Introduction to the GNU/Linux operating system - Basics
- Discussion of the Free Software Foundation's efforts to deliver ubiquitous UNIX!
- Emphasize the role and importance of the GNU project
- Identification of various Linux distributors including Debian, Mandrake, RedHat®, etc.
- Introduction to the widely-used RedHat® Linux distribution
- Explore Linux system documentation (man, info, GNOME, etc.)
- Explain the Filesystem Hierarchy Standard (FHS) - UNIX is one big directory!
- Explore the Linux file system
- Identify the various interfaces to Linux
- Discuss the role and release rules of the Linux Kernel
- Demonstrate usage of file & directory tools (pwd, ls, cd, touch, cp, mkdir, mv, rm, which, rpm)
- Basic BASH shell navigation & PATH & variable manipulation (set,unset,env,export,etc.)
- Explore usage of common user-tools (cat, echo, find, locate)
- Demonstrate typical usage of vi/vim ASCII text editors
- Installation & implemenation of pine mail reader and pico text editor
- Demonstrate typical usage of the king of all UNIX/Linux editors; EMACS
- Explain & demonstrate standard in, standard out, redirection & pipes
- Demonstrate usage of backup/restore tools (tar, gzip, gunzip)
- Identify basic utilities and package memberships
- Demonstrate usage of system monitoring tools (uptime, free, top, vmstat, meminfo, cpuinfo, ps, kill, watch)
- Identify the various types of files on Linux systems
- Identify Filesystem tools (fsck, fdisk, mkfs, parted)
- Mounting/unmounting basic Linux floppy, CD & ISO files
- Identification of major online open source repositories (sourceforge, freshmeat, etc.)
- Perform client Installations
- Planning the installation - identify software, hardware requirements & disk partitioning defaults
- Demonstrate complete upgrade
- Demonstrate complete client installation from bootable CD
- Create network-based source-tree on a centralized server for installation
- Prepare for network-based FTP installation - create bootable media/obtain patches/etc.
- Demonstrate complete client installation from FTP server
- Prepare for network-based Kickstart automated installation via Network File System (NFS)
- Create Kickstart installation source tree
- Perform Kickstart automated installation via NFS
- Post client installation acclimation, exploration and configuration
- Discuss X-Windows client/server concepts, applications & security
- Learn how to configure X-Windows to support your hardware
- Discussion of window managment concepts and applications
- Customize desktop environment for GNOME & usage
- Customize desktop environment for KDE & usage
- Explore the shell interface including common tools, utilities, semantics, etc.
- Implement Mozilla web browser
- Confiure the Java JRE as a plug-in for the Mozilla web browser and evaluate results
- Implement Java Runtime Environment (JRE/J2SE) for system-wide access to Java applets/etc.
- Implement Macromedia Flash plug-in and configure support in Mozilla and evaluate results
- Download & Install Netscape web browser
- Configure Java & Flash support for Netsacpe and evaluate results
- Implement Ximian Evolution POP3/IMAP/Microsoft Exchange email client
- Implement & explore RDESKTOP terminal services desktop connectivity to Windows 2003/2000/XP servers running Remote Desktop Protocol (RDP)
- Demonstrate typical RDESKTOP Windows usage for productivity, multitasking and connectivity
- Upgrade RDESKTOP to version 1.3.1 & Remove RDESKTOP 1.2.x
- Demonstrate some of the new capabilities of RDESKTOP 1.3.x
- Troubleshoot common X-Windows and client-related problems
- Implement VNC server screen emulation program for multiple remote desktop access
- top
- Linux client network administration essential concepts and applications
- User and group creation & management concepts - passwd, shadow, group, gshadow files
- Compile and install John The Ripper Password Cracking tool
- Validate password integrity with John The Ripper Password Cracking Tool
- Explain UNIX/Linux file security & permissions (-rwxrwxrwx/777) rules & concepts
- Discuss and demonstrate the client/server paradigm and distributed computing concepts
- Identify & demonstrate usage of common client/server tools(SSH/HTTP/FTP/IMAP/POP3/SAMBA/etc.)
- Demonstrate LFTP (Sophisticated FTP Client Software) usage
- Use LFTP to connect to FTP & HTTP servers
- Use LFTP to recover broken uploaded/downloaded transmissions
- Use LFTP to mirror & reverse mirror the content of local and remote servers
- Linux networking primer - Identify key Linux networking components
- Implement DHCP IP addressing with Cisco PIX Firewall DHCP Server integration
- Configure Linux client for DHCP configuration from a Cisco PIX firewall
- Configure Linux client with static TCP/IP parameters for network communication
- Test network connectivity internally and externally via ICMP & TCP-Port querying methodologies
- Explore all graphical redhat-* & redhat-config-* configuration tools
- Configure Network Time Protocol (NTP) via GUI & Shell interface to perform time synchronization
- Discuss and implement Samba(SMB) connectivity to Windows 2003 Server
- Implement client printing services via Common UNIX Printing System (CUPS) to Windows 2003 Server & HP JetDirect-enabled printer.
- Discuss and implement NFS connectivity to Linux hosts and Windows 2003(NFS)
- Evaluate RedHat® Package Manager (RPM) to add/upgrade/remove applications
- Discuss & demonstrate Backup & Restoration procedures
- Discuss scenarios and create Linux Rescue disk for emergency system recovery
- Perform Server Installations of RedHat® Linux
- Prepare for server installation - verify system BIOS parameters/support
- Demonstrate complete server installation from bootable CD-ROM
- Demonstrate creation of installation source tree for network-based installations
- Demonstrate complete server installation from an Apache HTTP Web server
- Demonstrate complete custom server installation from HTTP Windows 2003 IIS server
- Demonstrate complete custom server installation from FTP server
- Demonstrate complete custom server installation from NFS server
- Prepare for an automated Kicstart installation - identify requirements
- Demonstrate complete server Kickstart automated installation from HTTP Apache Web server
- Demonstrate complete server Kickstart automated installation from FTP Apache Web server
- Connect system via serial communications to Sun Fire V100 SPARC box
- Recap installation methods including caveats
- Linux Systems Management Concepts & Applications
- Explain Linux Boot process and contrast boot managers - GRUB & LILO
- Discuss the role of the init grandfather process and illustrate logical boot flow
- Explain and demonstrate Runlevel (0 - 6) concepts & applications
- Demonstrate Daemon/Service management with (chkconfig/ntsysv/redhat-config-services)
- User profile implementation logic and concepts - (Bash profile/etc/skel/aliases/PATH/etc.)
- Quota management - user-based, group-based and disk-based quota implementation
- Introduce, partition using FDISK and create an EXT3 journaling file system of 100GB of additional system storage. Identify paritions in /proc virtual file system
- Demonstrate usage of RPM to ascertain available packages
- Demonstrate usage of RPM to import public keys of package publishers
- Demonstrate usage of RPM to verify the integrity of downloaded packages
- Demonstrate usage of RPM to add new packages locally
- Demonstrate usage of RPM to add new packages from a Windows 2003 FTP server
- Demonstrate usage of RPM to add new packages from an HTTP server
- Demonstrate usage of RPM to upgrade packages
- Demonstrate usage of RPM to freshen packages
- Demonstrate usage of RPM to remove packages
- Introduction to SYSLOG concepts
- Explanation of syslog facilities & levels
- Demonstrate syslog administration
- Demonstrate Cisco to Linux SYSLOG functionality
- Discuss & demonstrate automatic log rotation and customization
- Kernel Management
- Demonstrate Linux Kernel upgrade procedures
- Use RPM to install multiple kernels and verify functionality
- Use RPM to remove outdated kernels
- Linux Network Administration Essentials
- Discuss & demonstrate the usage of commonly used networking tools:
- PING - Demonstrate PING flooding of remote hosts - ICMP Attack Techniques
- PING - Cisco PIX Integration & Debugging of ICMP Echo Requests/Echo Replies
- Traceroute - Cisco PIX Integration & provisioning of ICMP traffic types
- MTR (PING & Traceroute functionality) plus Cisco PIX debugging of ICMP data flow
- ARP
- NETSTAT/LSOF
- IFCONFIG
- Route
- DIG & NSLOOKUP
- Whois
- Who, w, wc, last, cat, grep, vi, pico, head, tail, etc.
- Message of the day banners (MOTD), /etc/issue file (pre-login banner/display info.)
- top
- Implement Dynamic Host Configuration Protocol (DHCP) services
- Explain the various steps of the DHCP process
- Configure global & scope-level DHCP options
- Configure IP reservations based on layer 2 MAC addresses
- Disable Cisco PIX DHCP services
- Enable Linux DHCP services
- Configure Windows 2003/XP/Linux clients to receive dynamic addresses from Linux
- Discuss Xinetd super server concepts and applications
- Identify services controlled by Xinetd
- Enable & disable Xinetd-controlled services & examine results
- Implement access control on Xinetd controlled services
- Implement Xinetd IP and port-level daemon redirection
- Discuss Xinetd & TCP Wrappers relationship and dual-layer security benefits
- Implement Very Secure VSFTPD File Transfer Protocol (FTP) services
- Implement anonymous FTPD
- Implement user-level FTPD access
- Implement FTPD banners
- Disable anonymous access
- Configure VSFTPD to run under the auspices of Xinetd super server for increased security
- Implement bandwidth rate-limiting to control bandwidth usage
- Discuss Linux & Windows Integration via Samba
- Install Samba support
- Install Samba Web-based Administration Tool (SWAT)
- Configure Samba file & print sharing
- Evaluate access to Samba file & print server
- Configure Samba Windows Internet Name Server (WINS) support
- Evaluate Windows XP/2003 client access to Samba-WINS server
- Discuss the Network File System (NFS) concepts and Linux support
- Implement the NFS daemon
- Review /etc/exports parameters and options
- Evaluate access to NFS exports
- Implement NFS connectivity across a WAN connection via IPSEC VPN-connectivity
- Discuss the CRON scheduling system concepts and application
- Identify various predefined CRON entries and schedules
- Define custom cron jobs system-wide
- Define custom cron jobs user-wide
- Evaluate results of cron jobs
- Implement the Berkeley Internet Daemon (BIND) Domain Name Server (DNS)
- Implement BIND 9.x
- Configure BIND as a caching-only DNS server
- Test caching-only name resolution from Windows 2003 & Linux hosts
- Secure access to caching-only/recursive name server via ACLs
- Configure BIND as a primary DNS server
- Test primary name resolution from Windows 2003 & Linux hosts
- Configure BIND as a secondary(slave) DNS server
- Restrict communications between primary & secondary DNS servers
- Implement updates between master and secondary DNS servers via IPSEC VPN
- Configure DNS zones on Linux BIND & Windows 2003 DNS - activate replication
- Implement poor man's load balancing using DNS round robin
- Evaluate results of BIND configuration using DIG
- Configure DNS zones
- Configure zone transfers
- Configure secure-zone transfers
- Evaluate BIND's configuration files named.conf & named.custom
- Configure BIND sub-domain delegation. i.e. internal.linuxcbt.net
- Configure BIND to support reverse domains
- Configure Linux/Windows 2003 clients to use Linux BIND DNS server
- DNS Transaction Signatures (TSIG) implemenation
- Identify BIND logging information for troubleshooting purposes
- Configure BIND DNS with IP Aliasing (Sub-Interfaces) to host DNS on separate IP address
- Implement Network Monitoring & Graphing tools using SNMP, etc.
- Implement Multi Router Traffic Grapher (MRTG)
- Graph Cisco Firewall with MRTG
- Implement Cacti Network Graphing Tool
- Download and Install Cacti and required components (RRDTool, MySqL, etc.)
- Explore Cacti Interface, options, etc.
- Graph Cisco, Linux & Windows 2003 resources with Cacti using SNMP & Scripts
- Implement Network Time Protocol (NTP) & Time Synchronization services for local subnets
- Discuss features and distributed nature of the hierarchial NTP service
- Ascertain and select optimal Stratum 1 NTP servers for synchronization
- Review default NTP configuration
- Configure NTP to synchronize with NTP servers
- Configure internal Linux clients to syncrhonize with internal Stratum 2 NTP server
- Configure Cisco PIX firewall to synchronize with internal Stratum 2 NTP server
- Use NTP-related tools such as NTPQ, NTPTRACE to ascertain NTP-related information
- Linux Web Services - Apache/Tomcat/CGI/WebLogic
- Discuss Apache Web Server's history, ubiquity (netcraft stats) and reliability
- Explain Apache Web Server's capabilities (Virtual directories, modules, WebDav, etc.)
- Implementation of Apache Web Server 2.x
- Evaluate installation/implementation results of Apache Web Server 2.x
- Demonstrate implementation of aliases & redirects via mod_alias
- Restrict access to aliases and test access from Linux & Windows 2003 nodes
- Examine implications of alias & redirect access on access & error logs from multiple hosts
- Demonstrate implementation of virtual directories
- Demonstrate configuration of several virtual hosts
- Discuss and implement Apache 2.x logging system per virtual host
- Configure basic authentication to virtual hosts containers via .htaccess & Directory directives
- Configure digest authentication to virtual hosts containers via Directory & .htaccess directives
- Configure SSL support for the virtual hosts
- Demonstrate SSL support without certificate provided by Certificate Authority
- Implementation of Webalizer Log Analysis software
- Customization of Webalizer to automatically generate reports for multiple virtual hosts
- Implementation of AWSTATS Log Analysis software
- Customization of AWSTATS to automatically generate reports for multiple virtual hosts
- top
- Dynamic web sites - Common Gateway Interface(CGI) & scripting engine discussion & implementation
- Implement CGI access to Linux via Apache & PERL scripts
- Discuss benefits of PHP Dynamic Web Access Scripting Engine
- Implementation of PHP Dynamic Web Access Scripting Engine
- Evaluate PHP Dynamic Web Access Scripting Engine installation results
- Execute sample PHP web pages on Apache Web Server 2.x
- Application Servers - Java J2EE Platform integration with Linux
- Discuss benefits of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine
- Implementation of Sun's Java Development Kit (JDK) 1.4.x for Apache Tomcat support
- Implementation of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine
- Evaluate Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine installation results
- Execute sample Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet applications
- Discuss benefits of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine
- Implementation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine
- Evaluation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine results
- Execute sample applications on BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine
- Discuss benefits of Jboss J2EE JSP/Servlet/Enterprise Java Beans Engine
- Implementation of Jboss JSP/Servlet/Enterprise Java Beans Engine
- Evaluation of Jboss JSP/Servlet/Enterprise Java Beans Engine results
- Execute sample applications on Jboss JSP/Servlet/Enterprise Java Beans Engine
- Discussion of messaging concepts and applications
- Sendmail MTA Essentials
- Introduction to Sendmail Message Transfer Agent (MTA)
- Implementation of Sendmail
- Configure Sendmail to relay messages for remote hosts
- Configure Sendmail to support virtual hosts/multiple domains
- Evaluate results of routing messages to multiple domains using Sendmail
- Sendmail logging capabilities
- Implement AWSTATS log reporting engine to generate HTML sendmail reports
- Postfix MTA Essentials
- Introduction to the Postfix Message Transfer Agent (MTA)
- Install Postfix
- Install Mail Transfer Agent (MTA) administrative switching tools
- Switch system from Sendmail to Postfix as default MTA
- Explore Postfix configuration files and directory structure
- Implement outbound messages via Postfix
- Confirm receipt of outbound messages on publicly-accessible systems
- Configure Postfix to support virtual domains
- Build Postfix virtual user mappings for virtual domains support
- Test virtual domains via external messaging sources
- Post Office Protocol Version 3 Essentials
- Discuss the capabilities and limitations of POP3
- Implement POP3 services
- Implement secure POP3 services
- Demonstrate access to POP3 services from the client perspective
- Implement Secure POP3 services using SSL with self-signed certificate
- Internet Messaging Access Protocol (IMAP)
- Discuss the capabilities and limitations of IMAP
- Implement IMAP services
- Demonstrate access to IMAP services from the client perspective
- Implement Secure IMAP services using SSL with self-signed certificate
- Web-based Mail Implementation using Squirrel-mail
- Describe required squirrel mail components for web-mail integration
- Install squirrel mail on Internet production system
- Configure squirrel mail defaults for linuxcbt.net domain
- Verify Sendmail virtual hosting configuration for linuxcbt.net domain
- Verify IMAP configuration
- Configure Apache alias for squirrel mail integration
- Configure Apache Virtual Host for squirrel mail integration
- Configure BIND DNS services for squirrel mail integration
- Explore squirrel mail's web-based interface
- Generate mail from various remote domains (hotmail.com, etc.) and retrieve with squirrel mail
- top
- Secure Shell (SSH) Concepts & Implementation
- SSH client concepts - replacement for clear-text-based Telnet, RCP, FTP protocols.
- Identification of required OpenSSH/OpenSSL components
- Demonstrate SSH connectivity & public key registration
- Implement globally-shared public keys
- Generate RSA & DSA public key/private key pairs
- Configure SSH client and SSHD to authenticate via public/private key pairs
- Authenticate to remote hosts using public/private key pairs
- Use Secure Copy (SCP) to move files
- Port Forwarding implementation
- Port Forwarding integration with Linux & Windows 2003 Server
- X11 Forwarding demonstration
- Use Secure File Transfer Protocol (SFTP) to move files
- Linux Defensive Security Implementation Techniques
- Implement NMAP port scanner and demostrate usage to ascertain open doors
- Discuss & demonstrate operating system fingerprinting techniques with NMAP
- Demonstrate IP-spoofing & packet forging with NMAP
- Discuss the benefits of the NESSUS Security & vulnerability scanner
- Implement Nessus client/server Security vulnerability scanner
- Demonstrate parallel security scanning of local & remote subnets
- Explore Nessus's reporting capabilities (NBE/XML/HTML/etc.)
- Demonstrate Nessus class-based access for corporate usage
- Implement Ethereal network sniffer
- Demonstrate telnet clear-text password theft with Ethereal
- Demonstrate alternative SSH encrypted sessions with Ethereal
- Demonstrate FTP clear-text password theft with Ethereal
- Demonstrate alternative SFTP encrypted sessions with Ethereal
- Implement HPING highly customizable packet forging tool
- Compare & contrast PING with HPING
- Demonstrate IP packet spoofing with HPING & Cisco PIX firewall integration
- Demonstrate HPING's ability to communicate with ICMP-filtered Internet servers
- Demonstrate using HPING to setup a trojan horse backdoor for executing arbritary code
- Implement John the Ripper password cracking tool
- Discuss file and directory security
- Implement chmod,chown,umask,SUID,SGID,etc.
- Linux Defensive Security Implementation Techniques
- Implement Multi-Router Traffic Grapher (MRTG) to establish network performance baseline
- Configure Cisco PIX firewall for MRTG support via Simple Network Management Protocol (SNMP)
- Configure MRTG to generate perfomance & badwidth-related graphs for Cisco PIX firewall
- Implement IP Tables Host-based firewall support
- Configure IP Tables to restrict access to necessary services
- Introduce, discuss & plan the implementation of Snort 2.x Intrustion Detection System (IDS)
- Discuss Snort intrustion detection concepts related to hubs & switches
- Install Snort 2.0 Network-based Intrusion Detection System
- Implement Snort 2.0 network sniffing functionality
- Implement Snort 2.0 sniffing & packet-logging functionality
- Demonstrate Snort's ability to monitor traffic between designated hosts
- Demonstrate password theft using Snort & FTP connections
- Demonstrate password theft using Snort & Apache HTTP basic authentication connections
- Implement Snort 2.0 Network-based Intrusion Detection System
- Implement SnortSnarf for web-based reporting of Snort 2.0 logs
- Examine SnortSnarf reports via SSL-enabled web session
- Demonstrate how to implement port mirroring on Cisco Catalyst switches
- Implement Network Address Translation (NAT)
- Discuss & Implement Port Address Translation (PAT)
- Implement TCP Wrappers
- Configure Xinetd to suppress access to the system from port-scanners
- Discuss & Disable Portmap services
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Sums Edition
Details
Release Info
Checksums ensure data-integrity, at-rest, cross-transit, and ultimately at-rest. Use them to verify Content as needed.Release Syllabus
Sums
- Various Tools
- Remote Confirmations
- File Metadata
- File Fragments
- Compress Content
- Archive Content
- DIR Hierarchy
- Password Sums
- Shared Secret
- Restrict History
- Downloaded Content
- Encrypt Content
- Site Credentials
- Site COOKIE
- Site COOKIE - Unique
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism