July 19, 2018

Recent Posts

Cisco ISE :: Upgrading ISE from 2.x to 2.4

In this video demonstration, we take a look at the process involved for upgrading ISE nodes from versions 2.x to the current latest release of 2.4.  

Docker :: Tips and tricks

This post will be ever evolving as I find more tips and tricks for working with Docker on Windows.  Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]

Docker :: interacting with containers and using dockerfiles

In part 1 to this series we installed Docker and got our very first container off the ground.  In this post, I want to take this a little further and build a new ubuntu image using a dockerfile.  A dockerfile is a file that docker can use to automatically modify an image by running commands, […]

Docker :: Getting start on Windows 10

Recently I was doing some hackery for a project and really struggled getting docker off the ground and serving up a website from within a container.  This particular project was on linux but actually docker can also run on Windows, using the “built in” functionality of Hyper V.  Not one to be defeated I set […]

Tenable Nessus, where has my API gone?

Nessus Professional (Pro) is undoubtably one of the cyber security consultants favourite tools. It has also been a widely adopted tool for organisations on a budget  looking to start out in the never ending world of vulnerability management. It’s humble beginning starting out as a fully open source tool, to the favourably priced commercial  entity we see […]

KT Labs EP5 :: ACS to ISE Migration

In the video, I show you how you can leverage the ACS to ISE migration tool to migrate objects from ACS to ISE. As mentioned in the video, a few prerequisites need to be met, these are listed below. Prerequisites Direct connectivity to both the ACS and ISE platforms The correct version of ACS (see […]

Cisco ISE :: Adding Traditional Licenses

In this video, I demonstrate how to add traditional licenses to Cisco ISE. Note: This lab video uses Cisco ISE 2.3

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]
Page 1 of 1212345 » 10...Last »

Subscribe to SYNACK via Email