>The Symbiote Malware

I recently came across an interesting post on LinkedIn covering a stealthy Linux threat that is targeting financial insitutions in Latin America. The title of the article flashed “New Linux malware ‘almost impossible’ to detect,” with researchers dubbing the threat “Symbiote” because of its parasitic nature. Of course, the Marvel fanboy in me was instantly …

>The Symbiote Malware Read More »

>Six Phases of Incident Response

Cybersecurity is a field that is important to pretty much every industry. A good cybersecurity system can help businesses stay safe from cybercrimes such as phishing attacks, malware attacks, and ransomware. Any organization that is serious about its cybersecurity should start with a good incident response plan. A cyber incident response plan tell a company’s …

>Six Phases of Incident Response Read More »

>Setting Up Docker Environment

Some basic docker commands to keep in mind: docker images – shows your current pulled images docker ps – shows current running containers docker ps -a – shows recently opened/closed containers *Containers can be pulled from Docker Hub. Downloading Docker Engine Normally when you are putting in docker commands, you refer to the desired image …

>Setting Up Docker Environment Read More »

>How to Set Up Docker on a Raspberry Pi

Downloading Docker Engine As always, it is important to make sure your system is up to date before installing and running convenience script: sudo apt-get update && sudo apt-get upgrade The Docker Engine convenience script can be easily installed by using the curl command below: curl -fsSL https://get.docker.com -o get-docker.sh You can use the ‘ls’ …

>How to Set Up Docker on a Raspberry Pi Read More »

>How Does Malware Work?

The term malware refers to harmful software that may disrupt or manipulate a computer’s normal operations. Malware can infect any device that has computing capabilities; phones, tablets, personal PCs, company equipment, etc. How does it work? Malware typically infects a machine by tricking a user to click into and/or install a program they shouldn’t have …

>How Does Malware Work? Read More »

>Setting up a Recursive DNS Server Using Raspberry Pi

What is a recursive DNS server? When you type a domain name into your browser and search it, you trigger a DNS lookup. A DNS lookup is where a DNS server communicates with several other DNS servers to track down an IP address and return it to the client. During the DNS lookup, a series …

>Setting up a Recursive DNS Server Using Raspberry Pi Read More »

>Setting Up Active Directory Environment

Now it is time to move into setting up an Active Directory environment for my lab using a Windows Server 2019 virtual machine. I will not be going over a detailed step-by-step walkthrough in this post, but instead summarizing what I have learned and applied. Throughout the post, I will provide links to guides I …

>Setting Up Active Directory Environment Read More »

>Three-Way Handshake (TCP/IP)

I previously blogged about the OSI model, which characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. TCP (Transmission Control Protocol) is another rule used in computer networking. The protocol is similar to the OSI model and consists of four layers: Application Transport …

>Three-Way Handshake (TCP/IP) Read More »