DNSSEC Explained (with AWS Route53 Hosted Zone Example)

DNS name resolution is essential to modern connectivity. The ability for hosts to be able to quickly and reliably resolve DNS domain names (e.g. www.google.com) to their IP address equivalents (e.g. 216.58.204.68 or 2a00:1450:4009:827::2004) to connect and consume services ensures consistent and performant network flows. Due to the essential nature of DNS, DNSSEC is an addition […]

More...

SSH – Show Supported (Encryption) Algorithms

If you want to verify what your SSH server is providing to clients as options of supported algorithms you can use the following command: It makes use of an NMAP script “ssh2-enum-algos.nse” to enumerate the list of algorithms that the SSH server supports. Useful if you are having issues with clients connecting using supported methods, […]

More...

VMware vCenter SSO Authentication via OKTA (with SCIM User Provisioning – Locally Driven)

VMware vCenter can use a multitude of authentication methods, such as LDAP, Active Directory and SAML (ADFS), however since vCenter 8.0 U1 the ability to integrate with OKTA for authentication has been added, which allows for adding MFA (multi-factor authentication) for enhanced security and detaching the vCenter appliance from Active Directory. When switching to use […]

More...

Quick Guide – SSH Public Key Authentication (Ubuntu Linux)

A quick guide to setting up SSH Public Key Authentication. SSH Public Key Authentication means you can authenticate to a remove server via SSH without needing to enter your username and password. Instead you create a public-private key pair, then place the public key on the target server. Then when you SSH to the server […]

More...

What can people really see when you use un-encrypted connections?

Although its becoming increasingly rare nowadays to be using un-encrypted connections, let’s see what it really means at the network level. Un-encrypted connections on their own are not necessarily a problem, its all about what value what you are sending has and therefore what could be exposed to a nefarious actor. If you are viewing […]

More...

Simple Web Application Firewall (WAF) CloudFormation Template

A Web Application Firewall (WAF), is a layer of protection you can add to your web application. Adding a WAF to an Application Load Balancer (ALB) is pretty straightforward. You need to create at least one WebACL, to which you configure some rules (that filter the traffic), you can then attach the WebACL to the […]

More...