Author: Jake

0

Security Concerns :: Ransomware

Working for a security consultancy/MSSP business, I come across a lot of customers who in the past have gone to companies seeking advice on a particular security threat that is getting more media attention...

0

Kali Linux :: Email Harvesting

In this post, I will show you a tool in Kali Linux that’s able to harvest email addresses that are publicly available on the internet. Why do I want to harvest emails? When working...

0

VMWare :: Clone a VM without vCenter

VMWare ESXi is a great free tool for any home lab, but something that is missing is the ability to clone VMs – a feature reserved for customers with vCenter. Well, there is a...

0

Firewall Troubleshooting :: CLI Packet Captures

In this post, I will cover the CLI based packet capture functionality for two firewalls; these are FortiGates and Check Points. Each have slightly different commands, but the results are fairly similar. This post will...

0

FortiGate :: Web Filter Troubleshooting

When troubleshooting issues with the web filtering tool on the FortiGate, there are a number of things to consider. This post will hopefully assist you with getting to the cause of the issue if you encounter...

0

FortiGate :: HA Troubleshooting

FortiGates are capable of a few methods of High Availability.  This post will help you troubleshoot issues with the FortiGate Cluster Protocol (FGCP) in Active/Active or Active/Passive configurations. What is HA? High Availability is...

0

FortiGate :: Flow Diagnostics

In this post, I will provide an overview of the Flow troubleshooting tool available on FortiGate devices. This tool will enable you to see what is happening to your traffic as it traverses the...