-
Continue reading →: Installing MediaWiki with Ansible (Linux)MediaWiki was developed originally for Wikipedia and has grown to support lots of sites. With this in mind you may consider installing MediaWiki and running a local wiki, especially as MediaWiki provides instructions on specific operating system installs. In an effort to speed up installs I’ve created an Ansible playbook…
-
Continue reading →: SOCKS Proxy (Linux)
When working remotely (i.e. away from home) I often think about how it would be great if I could open up some of my internal projects when I have spare time and carry on working on them. There are multiple options on how I could do this, some are costly…
-
Continue reading →: Security: MAC Address and ARP (Notes)
Every network interface controller (NIC) has a Media Access Control (MAC) address which is unique to the interface. A device may have multiple network interfaces (e.g., a ethernet network interface and a wireless network interface) and will a MAC address for each interface (e.g., a Rasperry Pi 4 has one…
-
Continue reading →: Hacking: The Art of Exploitation – Book Review (Security)
Hacking: The Art Of Exploitation (2nd Edition) was released back in 2008, written by Jon Erickson and published by No Starch Press. I originally received a copy as part of a Humble Bundle and purchased physical copy in 2019 (19th printing!), off the bat that should show how much I…
-
Continue reading →: Security: Symmetric / Asymmetric Encryption (Notes)
Symmetric encryption uses the same key to encrypt and decrypt information. Symmetric encryption is generally faster than asymmetric encryption. However, it has the issue of finding a secure method of sharing the key (e.g., password) for the encryption so that it may be used. Symmetric encryption includes: Block ciphers such…
-
Continue reading →: Security: OWASP Top Ten (Notes)
The Open Web Application Security Project (OWASP) provides a top ten security risks in web applications at https://owasp.org/www-project-top-ten/ . The ranking of risks can help developers (and organisations) make their applications more secure. The 2021 OWASP Top Ten Broken Access Control Cryptographic Failures Injection Insecure Design Security Misconfiguration Vulnerable and…
-
Continue reading →: Security: Risk Assessment (Notes)
The National Institute of Standards and Technology (NIST) produced the NIST Special Publication (SP) 800-30 to help conduct risk assessments. A risk is where a threat intersects with vulnerability, e.g. where a vulnerability exists and is used by a threat. Threat sources can come in many forms such as: Adversarial…
-
Continue reading →: AWS – EC2 User Data: Preparing Ubuntu Instance For Ansible Management (AWS / Ansible)
I have used previous blog posts to discuss using Ansible to create / manage AWS EC2 instances, and using Terraform with Ansible to create / manage AWS EC2 instances. However, there are people that prefer to use the AWS web console over Infrastructure as Code (IaC). If you find yourself…
-
Continue reading →: AWS Lambda – Stop Instances Outside Office Hours (Python / AWS)
I previously wrote about using some Python to stop AWS EC2 instances that had the tag “office_hours” and indicated that this could be automatically run via AWS Lambda. This blog post is a brief follow up with some notes on creating the Lambda function, using the Python from the previous…
-
Continue reading →: Ansible – SSH and Password Protected Private Keys (Linux)
It is recommended to password protect private SSH keys, so if they do ever end up in the wrong hands then a password is still needed to access them. If you wanted to go really secure Ansible Vault could be used to encrypt the private key alongside the password. This…

