Posts

# 9 : Cybersecurity Detection Home Lab: Installing Splunk

Image
  Cybersecurity Detection Home Lab: Installing Splunk In this article, I will guide you through the process of installing Splunk free version on a virtual machine. Splunk is a powerful tool for analysing, monitoring and visualising machine-generated data. It helps organisations turn their data into actionable insights, enabling them to make informed decisions and improve their operations. Splunk provides both free and paid versions. Step 1: Download Splunk Free Version The first step is to download the Splunk free version from the official website. Go to the Splunk website and click on the “Download Free Splunk” button. Choose the version that is compatible with your operating system and download it. Step 2: Create a Virtual Machine You need to have a virtual machine in which to install Splunk. You can use any virtual machine software, such as VirtualBox, VMware, or Hyper-V. Once you have created a virtual machine, make sure that it has the required specifications to run Splunk. The m

# 8 : Active Directory Home Lab Setup and AD Attacks

Image
In my previous post, I shared my experience of setting up a budget-friendly home lab and mentioned my search for projects. I am thrilled to announce that I have found the perfect fit in the Active Directory Home Lab Setup course offered by the Capture the Talent Academy.  https://capturethetalent.co.uk/academy The course is 100% free and covers everything you need to know about setting up an Active Directory environment in a home lab. It is taught by experienced professionals who share their knowledge and expertise in a clear and concise manner. Active Directory (AD) is a critical component of many organisational networks, and understanding how it works is essential for cybersecurity professionals. During the Capture the Talent Academy course, you learn how to set up a complete AD home lab environment using VMWare Player, a number of different virtual machines (VMs), and a variety of AD-related tasks. The process begins by downloading and installing VMWare Player, a free virtualization

# 7: Say Goodbye to the Pi: Setting Up a Home Lab on a Budget

Image
In this post, we'll explore how you can set up a computer lab using a relatively cheap reconditioned Desktop PC. The Dell OptiPlex 7020 SFF Desktop PC is a powerful machine that comes with an Intel Core i7 4770 processor, 16GB of RAM, and a 512GB SSD. These specs make it an ideal choice for a home computer lab as it provides ample processing power and storage space and you can find one for as little as £140 on a number of famous sites. The first step in setting up your computer lab is to install a virtualisation software such as VirtualBox or VMWare. This software allows you to run multiple virtual machines (VMs) on a single physical machine. With virtualisation software, you can create and run multiple VMs, each with its own operating system, without having to worry about the space and hardware requirements of each. Next, you'll want to download and install different operating systems (OSs) to run on your VMs. For example, you could install Windows Server, Linux, and Windows 1

# 6: Pythonic Port Probe

Image
A Raspberry Pi Adventure (again): Scanning the Network with Nmap and Python Welcome to the world of Raspberry Pi, where small computers meet big adventures! In this blog post, we'll explore the fun side of network scanning with Nmap and Python, using a trusty Raspberry Pi as our tool of choice. But why use a Raspberry Pi for network scanning, you might ask? Well, for starters, it's small, compact, and portable, making it easy to carry around for on-the-go scans. Plus, with its low power consumption and low price tag, it won't break the bank or fry your circuits. So, let's dive in and see how we can use the power of Python and Nmap to scan our network and uncover its secrets. Step 1: Installing Nmap First things first, we need to install Nmap on our Raspberry Pi. Step 2: Installing Python Next, we need to install Python allowing us to use Nmap from within our Python scripts. Step 3: Nmap Python script Now that we have Nmap and Python installed, it's time to write our

# 5: Why is it good to hire a former teacher?

Image
Why is it good to hire a former teacher? Excellent communication skills: Ex-teachers have experience conveying complex ideas and concepts to diverse groups of students, which is useful for interactions with colleagues and clients. Organisational skills: Teachers are often required to keep track of multiple tasks and deadlines, which is beneficial in any work environment. Knowledge of teaching and learning: Teachers have a deep understanding of how to effectively teach and convey information to others, which is valuable not only for training purposes but any situation where information needs to be precisely and effectively communicated. Experience working with diverse groups of people: Teachers work with students from a wide range of backgrounds and abilities, which makes them adept at interacting with clients and customers. Adaptability: Teachers must be able to adjust their teaching style to best meet the needs of different learners, which means they must be flexible, adaptable and go

# 4: Pi Scanner

Image
After a week of refining my vulnerability scanner operating skills, I wanted to see if I could convert my Raspberry Pi into a semi-portable Nessus vulnerability scanner. Again, the Pi did not disappoint (I, by the way, do not work for Raspberry Pi). The most difficult aspect of the process was the amount of time it took the Nessus programme to load and finish assembling its plugins (around 1 hour and 20 minutes).   The right Nessus version for the Raspberry Pi was simple to locate and download from the Tenable website; I used the terminal to unpack, install, and launch the Scanner. The installation is done in a browser, and I enrolled for the Nessus Essentials licence. After entering the activation code, it's off and running, well, more of a leisurely stroll; it did take a long time to get going, but it did. Then you must choose the type of scan you wish to perform and its target. I ran a simple scan on a laptop on my network and waited for the results. Surprisingly, just a few v

# 3: Capslock the journey thus far

Image