Profile cover photo
Profile photo
Nishchal Kush
37 followers
37 followers
About
Communities and Collections
Posts

Post has attachment

Post has attachment
Metasploitable2 Walk-through
(This is an interim post and will be updated progressively. This note will be removed once done.) This post extends the walk-though on the initial version of Metasploitable at http://nkush.blogspot.com.au/2011/09/metasploitable-walkthrough.html. Set-up The ...

Post has attachment
Setting up git
Git is yet another open source version control, and seems to be the tool of choice for contemporary coding mavericks. I still prefer svn and cvs, for centralised version control, but can appreciate why some projects may require distributed repositories as a...

Post has attachment
Denyhost 2.6 on CentOS 6.5
Denyhosts is another utility similar to fail2ban. It parses log files to identify potential attacks against SSH services. A clear advantage that Denyhosts has over fail2ban is the synchronisation mechanism since version 2.0 [1] . Denyhosts permits communica...

Post has attachment
Configuring RANCID on CentOS 6.5
RANCID stands for really awesome new cisco configuration differ [1] and polls Cisco devices to get a copy of the configuration and an inventory of the hardware and commits the details to a version control system such a CVS or SVN. The version control is use...

Post has attachment
Dog Training for Network Admins: Managing POODLE - CVE-2014-3566
CVE-2014-3566 relates to a flaw found in handling of padded bytes in SSL 3.0 when using CBC mode for the encryption [3] . The flaw may be exploited to permit a man-in-the-middle (MITM) attack. The attacker may be able to decrypt a selected byte of a cipher ...

Post has attachment
Wait while more posts are being loaded