Recently I have come through an interesting problem. I needed to download a raw copy […]
Quagga Routing Software with EIGRP Support
In May 2013, Cisco opened its proprietary EIGRP protocol and released an informational RFC 7868 […]
Forensics Challenge for CSIRT Team - Part 2 Solution
The goal of the tutorial is to provide a solution to the forensic challenge game that I […]
Forensics Challenge for CSIRT Team - Part 1 Assignment
I have created a virtual machine that you can use to test your forensics analysis skills. Please, […]
Forensic Lab Game Zero - Level 2 Results
Below are my solutions to the level 2 of the forensics lab game zero. The solutions […]
Forensic Lab Game Zero - Level 1 Results
The goal of the post is to provide solutions for the first level of the game […]
Slovakia Wins Cyber Exercise Locked Shields 2016
Tallinn, April 22, 2016 – The team from Slovakia won Locked Shields 2016, the world’s […]
BASH Script for Dictionary Attack Against SSH Server
Although they are several dictionary password attack tools available for Linux such as Hydra, Ncrack, […]
Collecting MAC and IP Adresses of Hosts Connected to Cisco Switches Using SNMP
The goal of this article is to introduce a script that automates a process of […]
GRE over IPSec Tunnel Between Cisco and VyOS
The previous tutorial shown GRE tunnel configuration between Cisco router and Linux Core. The big advantage […]