Author Archives

Information Security Practitioner

  • Replacing the Default Splunk Web SSL Certificate

    This post  goes over how to sign a SplunkWeb Certificate Signing Request (CSR) using my Root CA in pfSense. I do not cover creating the Root CA. Step 1: Create the directory for the certificates

    Step 2: Generate the… Read More ›

  • Working with Raw LVM Disk Images

    Mounting disk images on Linux is fairly straight forward, however an image with a Logical Volume Manager (LVM) partition requires a little more attention. The first thing I do is find out some information about the image(s):

    -l lists… Read More ›

  • Slackware LVM over LUKS

    This is mostly a post to document my process of setting up Full Disk Encryption (FDE) using the Linux Unified Key Setup (LUKS) and the Logical Volume Manager (LVM). Most major distributions already enable this process at installation, however Slackware… Read More ›

  • Using NetworkManager with DNSMasq and Slackware

    dnsmasq on Slackware 14.2 is compiled without D-Bus.

    The logs show NetworkManager trying to start dnsmasq, but failing:

    After downloading the source files and SlackBuild resources from a Slackware Mirror, validate the GPG  signature using the provided .asc… Read More ›

  • Migrating and Upgrading Apache Guacamole to Docker

    UPDATED: I have created an all-in-one (AIO) version that includes nginx using TLS. Apache Guacamole is a client-less remote desktop gateway. I use it in order to access my lab when traditional methods are not available. Guacamole does not use… Read More ›

  • AutoFS with DHCP Classless Static Route Option

    My FreeNAS server is a virtual machine (VM) on my Dell r710 server. I mount my NFS and CIFS Shares using AutoFS and configure my static routes to the NAS using the DHCP Server on my pfSense Appliance. AutoFS is software… Read More ›

  • Using Physical Security Keys with Slackware Linux

    Most people are aware of the various computer data breach incidents and password dumps that have occurred over the last few years. You can even visit Have I Been Pwned (HIBP) to find out if your email address is included… Read More ›

  • Using OpenSSL and pfSense to sign a Subordinate Windows Enterprise Certificate Authority

    Disclaimer: A Root CA trusted by Active Directory should not be trivialized. Make sure you know what you are doing when working with PKI. Take the time to study the technology before implementing it in production environments. There hasn’t been any… Read More ›

  • Handcrafting Linux Shellcode

    Crafting your own shellcode requires getting muddy with low level programming. One does not simply write machine code from memory. This blog post is my attempt at providing a template and tutorial of the shellcode creation process for a 32-bit… Read More ›

  • Mounting NFS Shares in Windows Using Identity Mapping

    Before we begin let us enable Services for NFS and both Sub Features. The typical way you will see an NFS share mounted in Windows involves mounting the remote file system using the anonymous (anon) user:

    This will give… Read More ›