ElevatedPrompt's CEO, Jason Ng, is featured in this week's Risk it podcast with Brayden York. Discussion on cybersecurity and risk. http://www.baseportfolio.com/riskitpodcast/15-cyber-breaches-and-proactive-protection-with-jason-ng Cybersecurity awareness and visibility is a vital part of keeping your organizations secure. Find out how ElevatedPrompt can help your organization today.
Threat hunting provides us with threat intelligence data on potential attacks and allows us to stay ahead of the cat and mouse game of cybersecurity. By understanding emerging threats, we are better able to protect our critical assets. elevatedprompt utilizes a multi-layer approach to proactive cyber defence, and by leveraging of our log management and threat intelligence platform – EPSTACK, we are [...]
Disclaimer: This article applies to Debian based Linux and Ubuntu variants Does not work if the user’s home drive is encrypted Getting started: I will be demonstrating how to use the Google authenticator PAM module for 2 factor. Google uses a time-based OPT algorithm and it does not phone home to work. You will need an Android or iOS device [...]
This time I will go over setting up SSH client in Linux, setting up key pairs and how to implement keys for authentication in Linux. Setting up tunneling in Linux is as easy as typing in: ssh -D 8080[:127.0.0.1] [email protected][:port] example: ssh -D 8080 [email protected]:443 In the above example my server is listening for SSH requests on port 443 instead of [...]
If you have completed Part I, you should have a running SSH server ready to tunnel all your needs. If you are on a PC running Microsoft’s Windows operating system like me, download PuTTY 0.62-installer.exe from http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-installer.exe and install it. PuTTY will be our SSH client and we are going to cover: Password Authentication Asymmetric Key based authentication (RSA) The [...]
Checking your Facebook page from Starbucks? Checked your banking information from the Hotel WiFi? Or are you going to Defcon this year? Public internet is not secure and there is a need for secure browsing. There are many ways to achieve this and Obfuscate the traffic for eavesdroppers and protect ourselves against Man In The Middle (MITM) attack. After trying a [...]