Setting up a 2-in-1 VM for Labs using Windows Subsystem Linux (WSL)

I am currently preparing a Network Fundamentals training that I'll be presenting in June and as part of that, I need a VM that I can share with the participants as I'll be incorporating some hands-on exercises in my presentation. Instead of setting up two different machines, I opted to use a Windows 10 VM … Continue reading Setting up a 2-in-1 VM for Labs using Windows Subsystem Linux (WSL)

Writeup: Advent of CTF 4 – Obfuscation

The fourth challenge hints on there being something hidden There are people who think you can hide important things by making it hard to read. The page welcomes us with the following message: Let's try inspect the page with Developer tools. We immediately notice that JavaScript is in play here. Navigating to the Debugger section … Continue reading Writeup: Advent of CTF 4 – Obfuscation

Writeup: Advent of CTF 3 – JavaScript

This challenge requires that we bypass the login mechanism used on https://03.adventofctf.com. Let's see what Developer tools has to offer. I tried filling in the form with username test password test but I see no activity in Network tab which is odd for HTTP(s) traffic. I went ahead and inspected the source and found a … Continue reading Writeup: Advent of CTF 3 – JavaScript

Writeup: Advent of CTF 2 – CookieMonster

For the 2nd challenge we are required to bypass the login mechanism used on this webpage https://02.adventofctf.com. This is the page we get when we navigate to the URL. I tried logging in with a random username:password test:test. Since we are logged in as guests, we do not see the flag. Using developer tools, noted that … Continue reading Writeup: Advent of CTF 2 – CookieMonster

Writeup: Advent of CTF 1 – The Source

We are asked to visit https://01.adventofctf.com to start the challenge. This is what we get when we navigate to the site. A password is required, which we obviously do not have yet. The page hints on finding a flag. Let's check Developer Tools. What immediately catches my eye is the encoded string YWR2ZW50X29mX2N0Zl9pc19oZXJl in the source code … Continue reading Writeup: Advent of CTF 1 – The Source

Setting up an IPSec VPN using Cisco Packet Tracer

This week was a rather intense one. I offered to be a volunteer trainer for a Network Security Bootcamp whose aim was to provide practical experience to new graduates and prepare them for a job in the Network Security field. At the end of the course, the students are expected to pass several exams among … Continue reading Setting up an IPSec VPN using Cisco Packet Tracer

Book Review & Summary: The Cuckoo’s Egg

Whenever someone asks me which cybersecurity book I’d recommend reading, my answer is instantly “The Cuckoo’s Egg”. This book can be enjoyed by both technical and non-technical people not only within the cyber sphere but also other unrelated fields due to its simplicity in explanation and captivating flow of events. It tells a story of … Continue reading Book Review & Summary: The Cuckoo’s Egg

Passed the AWS Certified Solutions Architect Associate SAA-C01 Exam

Today was my second attempt on the AWS Certified Solutions Architect Associate exam. My initial attempt was about 6 months ago. I was in a hurry to get it over and done with and despite the fact that I did not feel ready, I went ahead and sat the exam. I found the exam to … Continue reading Passed the AWS Certified Solutions Architect Associate SAA-C01 Exam

Cisco Wireless: Cisco Prime Infrastructure 2.0 Summary Notes

Cisco Prime Infrastructure Cisco Prime Infrastructure (CPI) is a converged solution that combines the following wireless functionalities: Cisco Prime Network Control System (NCS) Cisco Prime LAN Management Solution (LMS) CPI is useful in accomplishing the following tasks: deploying end-to-end network infrastructure maintaining end-to-end network infrastructure managing end-to-end network infrastructure Cisco Prime Licences Assurance add-on license - Provides … Continue reading Cisco Wireless: Cisco Prime Infrastructure 2.0 Summary Notes

Cisco Wireless: WebAuth on WLC

Web Authentication WebAuth is an authentication method without encryption. It provides Layer 3 security. WebAuth with Local WLC The client (end user) opens a web browser and enters a URL. Client resolves URL using DNS Client sends HTTP request to IP address of the site The WLC URL sends the user to a login page. If authentication is … Continue reading Cisco Wireless: WebAuth on WLC