Posts by ISeeTWizard

    Press Alt + F11 keys to open the Microsoft Visual Basic for Applications window.

    Click Insert > Module, and paste below VBA code into the new module window.

    Press F5 Key or Run button to run this VBA code.

    In the popping out Select Folder dialog box, please select the specific folder whose empty subfolders you will delete in bulk, and click the OK button.

    Now a Kutools for Outlook dialog box comes out and shows you how many empty subfolders have been deleted. Click the OK button to close it.
    Until now, all subfolders of the specified Outlook folder have been deleted in bulk already.

    This FAQ comes from the following website:

    How to batch delete all empty folders in Outlook?
    Learn how to delete empty folders in Outlook to keep your mailbox organized and clutter-free.
    www.extendoffice.com

    Sometimes people need to open more than 10 mailboxes in Outlook but this is not possible due to a limit of the default Outlook settings.

    With a simple registry entry you can change this.

    Code
    Windows Registry Editor Version 5.00
    
    [HKEY_CURRENT_USER\Software\Microsoft\Exchange]
    
    "maxnumexchange"=dword:00000015

    But I wouldn't change this to a too high value - 15/20 and than you should consider in having 2 or more Outlook profiles.

    To make it hackers less easy to connect with RDP to our servers or desktops we can change the port for this and I really recommend it to every one.

    Simply choose a random number and than follow the instructions here.

    This can be achieved by using regedit to manipulate the registry

    Code
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\

    Enter here for the PortNumber a new decimal value (switch from hexadecimal to decimal).

    Pay attention to not forget to adapt your firewall rules with the new ports and your port forwarding rules within your router.

    MDR, which stands for managed detection and response.
    XDR, which stands for extended detection and response.
    EDR, which stands for endpoint detection and response.

    Features

    EDR

    MDR

    XDR

    Scope

    Endpoint devices only

    Broader infrastructure
    endpoints, networks, etc.

    Multi-Layer
    endpoints, networks, cloud, email, etc.

    Threat Detection

    Endpoint level detection

    Managed threat detection

    Cross-Layer threat detection across various systems

    Response

    Endpoint focused automated response

    Managed incident response with expert intervention

    Coordinated automated response across mutiple layers

    Management

    Requires internal teams

    Managed by an external service provider

    Mix of internal an automated management

    Visibility

    Limited to endpoint activities

    Endpoint and network visibility

    Holistic visibility across multiple layers and systems

    Human Expertise

    Requires in-house security expertise

    Extenral experts provide threat analysis and response

    Can involve human experts but focused on automation

    Automation

    Limited to endpoint level tasks

    Relies on humand and some automation

    High automation and orchestation across layers

    Cost

    Lower but requires in-house resources

    Higher due to managed services

    Medium to high for integrated multi-layer coverage

    Alert Management

    Can lead to alert overload from endpoints

    Alerts filtered by service provider

    Reduced alerts through correlation across multiple layers

    Ideal for

    Focused on endpoint security

    Companies with limited internal security resources

    Enterprises needing integrated protection across layers

    The different headings are links to the corresponding external site about the tool!


    OpenVAS

    • Vulnerabilities scanner
    • Can scan a target or a network with more of 4000 tests
    • Provide a report detailing any security vulnerabilities discovers


    SQLMap

    • Database exploitation
    • Automatic SQL injection
    • Sump entire or specific DB user
    • Tables, columns etc. monitoring
    • Automatic recognition of password hash and cracking with dictionary attack


    AIRCRACK-NG

    • WiFi Network security
    • Can recover WEP/WPA key
    • Wireless network monitoring


    MALTEGO

    • Data Mining Tool
    • OSINT Tool


    OpenSSH

    • Tool for remote login
    • SSH Tunneling


    Nessus

    • Vulnerabilities scanner
    • Database updated daily


    Zed Attack Proxy

    • WEB Application Scanner
    • Fuzzing
    • Websocket Testing
    • Flexible scan Policy Management


    Wireshark

    • Packets Analyser
    • GUI & Command line (tshark)
    • Free & Multiplatform
    • Can see the network traffic and detailed informations about packets. You can also use filters.


    Metasploit Packets Analyser

    • Exploitation Tool
    • Frequently updated
    • Open source and huge community
    • Free & Multiplatform


    John the Ripper

    • Password Cracker can crack different types of encrypted passwords
    • Brute Force Attack
    • Dictionary Attack


    NMAP

    • Security Scanner
    • Identify the device on a network
    • Can detect the running OS and open ports


    Burp Suite

    • Web Pentest
    • Target ASElyssf
    • Web Proxy
    • Lots of usefull mode


    VirusTotal

    VirusTotal refers to a popular online service used to scan files and URLs for viruses, malware and other security threats.


    Hybrid Analysis

    Hybrid Analysis is a sophisticated method used in cybersecurity for malware detection and analysis that combines both static and dynamic analysis techniques.


    ClamAV

    ClamAV is an opensource Linux based antivirus software widely used for detecting malware, viruses and other malicious threats.


    Suricata

    Surciata is an opensoruce network security tool for realtime threat detection, acting as an IDS, IPS and network monitor.


    Kali Linux

    Kali Linux is a Debian based operating system designed for cybersecurity offering a wide range of tools for penetration testing.


    MISP

    MISP is an open-source platform for sharing and analysing cybersecurity threat intelligence.

    The simplest way to realize that is to create a script for that.

    On MSDN you can find the following and it's working like a charm.


    Save this to a file named WUA_SearchDownloadInstall.vbs as example and than you can simply run cscript WUA_SearchDownloadInstall.vbs and he automatically searches for Updates and than asks to install them.

    There is also the option through the sconfig tool but this doesn't seem to always work like it should, at least in my case.

    Sconfig is the server config tool you now have as default on every core server. It opens automatically and trough option 6 (Windows Server 2012 R2, 2016, 2019 and maybe on newer versions) you can download and install updates.

    Enter in an elevated command prompt the following:

    Code
    Dism /online /Set-Edition:ServerStandard /AcceptEula /ProductKey:12345-67890-12345-67890-12345

    Of course you have to enter your correct Product Key


    To get the TargetEditions you can use

    Code
    Dism /online /Get-TargetEditions

    Possible Options are:

    • ServerDatacenter
    • ServerStandard
    • ServerSolution
    • ServerEnterprise

    CP/M 86


    released

    1982

    floppies

    onesided 5,25" floppies


    CP/M 86 was brought out by Digital Research for the Intel 8080 CPU.
    It was the following version of the CP/M standart OS.


    It’s an operating system for 8-bit computers. It looks rather like DOS to use (only not so user-friendly); this is hardly surprising because DOS was copied from CP/M in about 1980.
    CP/M comes/came in three main versions; 1.4, 2.2 and 3.1. v2.2 was the basis of MSDOS, while v3.1 evolved into DRDOS and OpenDOS / DR-DOS.

    There were also 8086 and 68000 versions of CP/M. CP/M-86 evolved into DOS Plus, Concurrent DOSand REAL/32.

    They sold 600.000 copies of the OS. CP/M stands for: Control Program for Microcomputers

    CP/M disc formats

    The disc format used is to some extent implementation dependent. CP/M has no standard system (like the DOS boot record) to store disc parameters on the disc. Some individual systems use their own boot records (eg Amstrad PCW) but in general the only way to determine a format is to use a program like DISKSTAT on the computer which generated the discs. The sectors of some discs may be software skewed – again, the best way to determine this is to examine the translation table on the source computer.


    The layout of a disc is:

    Zero or more reserved tracks;
    One or more data blocks, a multiple of 1k in size. The data blocks can span tracks and usually contain multiple sectors.
    Any spare sectors – ignored by CP/M.
    There is one directory (with a fixed size), which occupies one or more blocks at the start of the file space. The directory contains 32-byte entries.


    DOS Plus 1.2 does not understand floppies bigger than 360k, and the only hard drive partitions it supports are DOS-formatted ones smaller than 32Mb. So, if you want to install it on your hard drive you may well have to do some serious partitioning.
    It will boot in the Linux DOS emulator as long as you have two or fewer emulated hard drives. It will crash on booting if there are three or more.




    Year 2000


    8-bit systems

    CP/M 1.x

    The OS makes no use of dates and so is fully Year 2000 compliant. You will still need to check any applications you use.


    CP/M 2.x

    The original Digital Research CP/M 2 makes no use of dates. However, several third-party BDOSes have been produced, which behave like CP/M 2 but also include time and date functionality:


    Z80DOS

    Z80DOS itself is 2000 compliant. Its date utility (TIMEZD12.COM) will not display dates past 2000 correctly, but such dates can be entered.


    DOS+

    DOS+ itself is 2000 compliant. Its date utility (TIME.COM) will accept dates past 2000, if they are entered explicitly as four digits.


    P2DOS

    P2DOS is 2000 compliant, and it is supplied with an excellent date utility that is also 2000 compliant.
    NovaDOS and SUPRBDOS are derivatives of P2DOS and the P2DOS information also applies to them.


    CP/M 3.x (CP/M Plus)

    The CP/M Plus BDOS is 2000 compliant, but the utilities DATE, DIR and SHOW are not.


    16-bit systems

    BDOS 2.x (CP/M-86 v1.1)

    The BDOS itself includes no date functions. However, the BIOS displays the current date on the screen; Year 2000 patches for this are available at the Unofficial CP/M Website, DOWNLOAD >> CP/M-86 >> PATCHES


    BDOS 4.x (DOSPLUS; Personal CP/M-86 v2.0/2; CP/M-86 Plus)

    The BDOS itself is Year 2000 compliant. The PCP/M-86 v2.0/2 and CP/M-86 Plus utilities (DIR.CMD; SDIR.CMD; SHOW.CMD; DATE.CMD) will not allow entry or display of dates after 2000. The DOSPLUS equivalent (COMMAND.COM) will.

    Here are some basic linux commands. Please be aware that depending on your distribution they might me slightly different or non existent.

    File and directory management

    command

    description

    ls

    list directory contents

    cd

    change directory

    pwd

    print working directory

    cp

    copy files and directories

    mv

    move or rename files and directories

    rm

    remove files or directories

    mkdir

    make directories

    rmdir

    remove empty directories

    touch

    change file timestamps or create empty files

    find

    search for files in a directory hierarchy

    locate

    find files by name

    tree

    display directories in a tree like format

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change group ownership

    stat

    display file or file system status


    File viewing and editing

    command

    description

    cat

    concatenate and display file content

    tac

    concatenate and display file content in reverse

    more

    view file content interactively (page by page)

    less

    view file content interactively (scrollable)

    head

    output the first part of a file

    tail

    output the last part of a file

    nano

    text editor in terminal

    vim or vi

    advanced text editor in terminal

    emacs

    text editor in terminal

    grep

    search text using patterns

    sed

    stream editor for filtering and transforming text

    awk

    pattern scanning and processing language

    cut

    remove sections from each line of files

    sort

    sort lines of text files

    uniq

    report or omit repeated lines


    Process Management

    command

    description

    ps

    report a snapshot of current processes

    top

    display linux tasks

    htop

    interactive process viewer (advanced top)

    kill

    send a terminate signal to a process

    killall

    terminate process by name

    bg

    resume a suspended background job

    fg

    bring a job to the foreground

    jobs

    list active jobs

    nice

    run a program with modified scheduling priority

    renice

    alter priority of running processes

    uptime

    show how long the system is up and running

    time

    measure program running time


    Disk management

    command

    description

    df

    report file system disk space usage

    du

    estimate file space usage

    fdisk

    partition table manipulator

    lsblk

    list information about block devices

    mount

    mount a file system

    umount

    unmount a file system

    parted

    partition table manipulator

    mkfs

    create a file system

    fsck

    file system consistency check and repair

    blkid

    locate/print block device attributes


    Networking

    command

    description

    ifconfig

    configure network interfaces

    ip

    show/manipulate routing, devices and tunnels

    ping

    send ICMP echo requests to network host

    netstat

    network statistics

    ss

    socket statistics

    traceroute

    trace the route packets take to a network host

    nslookup

    query internet name servers interactively

    dig

    DNS lookup utility

    wget

    non-interactive downloader

    curl

    transfer data with URLs

    scp

    secure copy files between hosts

    ssh

    secure shell for remote login

    ftp

    file transfer protocol client


    User and group management

    command

    description

    useradd

    add a user

    usermod

    modify a user

    userdel

    delete a user

    groupadd

    add a group

    groupdel

    delete a group

    passwd

    modify the user password

    chage

    change password expiry information

    whoami

    print the current logged in user

    who

    show who is logged in

    w

    show who is logged in and what they are doing

    id

    display the user and group id

    groups

    show the user's groups


    System information and monitoring

    command

    description

    uname

    print system information

    hostname

    show or set the system's hostname

    uptime

    how long the system has been running

    dmesg

    boot and system messages

    free

    display memory usage

    top

    display linux tasks

    vmstat

    report virtual memory statistics

    lscpu

    display information about the CPU architecture

    lsusb

    list USB devices

    lspci

    list PCI devices

    lshw

    list hardware configuration


    Archiving and compression

    command

    description

    tar

    archive files
    tar -czf test.tar.gz /directory/path/ → compress files using gzip
    tar -xzf test.tar.gz → extract gzipped tarball
    tar -cf test.tar → /directory/path → create a tarball
    tar -xf test.tar → extract tarball

    zip

    package and compress files into a ZIP archive

    unzip

    extract files from a ZIP archive

    gzip

    compress files using the gzip algorithm

    gunzip

    decompress files compressed with gzip

    bzip2

    compress files using the bzip2 algorithm

    bunzip2

    decompress files compressed with bzip2

    xz

    compress files using the xz algorithm

    unxz

    decompress files compressed with xz


    Package Management

    Debian based (like Ubuntu)

    command

    description

    apt-get

    APT package handling utility
    apt-get install packagename → install a package
    apt-get update → update package list
    apt-get upgrade → upgrade installed packages
    apt-get remove packagename → remove a package

    apt-cache

    query APT cache
    apt-cache search packagename → search for a package
    apt-cache show packagename → show package details


    Red Hat based (like Centos, Fedora)

    command

    description

    yum

    package manager for RPM based systems
    yum install packagename → install a package
    yum update → update installed package
    yum remove packagename → remove a package

    dnf

    next generation package manager (CentOS 8+, Fedora)
    dnf install packagename → install a package
    dnf update → update installed packages
    dnf remove packagename → remove a package


    General

    command

    description

    rpm

    RPM package manager
    rpm -i packagename.rpm → install an RPM package
    rpm -e packagename → remove an RPM package

    dpkg

    Debian package manager
    dpkg -i packagename.deb → install a Debian package
    dpkg -r packagename → remove a Debian package


    System services and daemon management

    command

    description

    systemctl

    control the systemd system and service manager
    systemctl start servicename → start a service
    systemctl stop servicename → stop a service
    systemctl restart servicename → restart a service
    systemctl enable servicename → enable a service to start on boot
    systemctl disable servicename → disable a service from starting on boot
    systemctl status servicename → check service status

    service

    older service management command (used in non systemd systems)
    service servicename start → start a service
    service servicename stop → stop a service
    service servicename restart → restart a service
    service servicename status → check service status


    Scheduling tasks

    command

    description

    cron

    daemon for running scheduled commands
    crontab -e → edit cron jobs for the current user
    crontab -l → list the current user's cron jobs
    crontab -r → remove the current user's cron jobs

    at

    run commands at a specified time
    at 06:00 → schedule a command to run at 6:00 o'clock

    batch

    run commands when the system load is low

    sleep

    delay for a specified time
    sleep 6s → sleep for 6 seconds


    File permissions and security

    command

    description

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change the group ownership of a file

    umask

    set default permissions for new files

    setfacl

    set file access control lists (ACL)

    getfacl

    get file access control lists

    sudo

    execute a command as another user (usually root)

    visudo

    edit the sudoers file safely

    passwd

    change a user's password

    sudoers

    manage sudo access for users

    gpasswd

    administer group password

    ss

    display socket statistics (for secure network connections)


    System backup and restore

    command

    description

    rsync

    remote file and directory synchronization
    rsync -avz source destination → synchronize files
    rsync -avz -e ssh source user@remote:/destination/ → sync over SSH

    cpio

    copy files to and from archives

    dd

    low-level copying and backup of entire filesystems
    dd if=/dev/sda of=/path/backup.img → backup a disk or partition
    dd if=/path/backup.img of=/dev/sda → restore a disk or partition


    System Diagnostics and Troubleshooting

    command

    description

    dmesg

    print the kernel ring buffer messages
    system boot and hardware related messages

    journalctl

    query and view logs from systemd's jourmal

    strace

    trace system calls and signals
    strace commandname → trace a command's system call

    lsof

    list open files
    lsof files → show processes using a specific file

    vmstat

    report virtual memory statistics

    iostat

    report CPU and I/O statistics

    mpstat

    report CPU usage statistics

    pidstat

    report statistics by process

    free

    display memory usage

    uptime

    how long the system has been running

    watch

    execute a program periodically - showing output
    watch -n 1 free → watch memory usage every second

    lshw

    list hardware configuration

    htop

    interactive process viewer

    netstat

    network statistics (replaced by ss)

    ss

    show socket statistics


    Networking & Remote Management

    command

    description

    ifconfig

    configure network interfaces (replaced by ip)

    ip

    a more modern alternative for managing network interfaces and routing
    ip addr → show ip addresses
    ip link → show or manipulate network interfaces
    ip route → show or manipulate routing tables

    ss

    show socket statistics

    nmap

    network exploration tool

    telnet

    user interface to the telnet protocol

    nc

    network utility for reading and writing from network connections
    netcat
    nc -l -p 1234 → listen on port 1234
    nc host port → connect to a host and port

    iptables

    administration tool for IPv4 packet filtering and NAT

    firewalld

    frontend for managing firewall rules (Fedora/CentOS)

    ufw

    uncomplicated firewall
    ufw enable → enable firewall
    ufw allow port → allow traffic on a specific port

    tcpdump

    command line packet analyzer

    curl

    transfer data from or to a server using various protocols

    wget

    download files from the web

    scp

    secure copy over SSH
    scp test.txt user@remotemachine:/path → copy file to remote machine

    rsync

    remote file and directory synchronization
    rsync -avz /path/ remotemachine:/path → sync directories between 2 machines


    Text Processing Utilities

    command

    description

    grep

    search for patterns within files
    grep 'pattern' file.txt → search for a pattern in a file
    grep -r 'pattern' /dirname/ → recursively search for a pattern

    sed

    stream editor for filtering and transforming text
    sed 's/old/ne/g' file.txt → replace old by new globally

    awk

    a powerful text processing language
    awk '{print $1} file.txt → print the first column of each line in a file

    cut

    remove sections from each line of a file
    cut -d ':' -f 1 /etc/passwd → print the first field of each line delimited by ":"

    sort

    sort lines of text files
    sort file.txt → sort file content in ascending order

    uniq

    report or omit repeated lines in a file
    sort file.txt | uniq → sort an remove duplicate lines

    tee

    read from standard input and write to standard output and files
    echo "text" | tee file.txt → write to file and show output on screen

    tr

    translate or delete characters
    echo "hello" | tr 'a-z' 'A-Z' → convert lowercase to upercase letters

    paste

    merge lines of files
    paste file1.txt file2.txt → combine lines of file1 and file2 side by side

    wc

    word, line, character and or byte count
    wc -l file.txt → count lines in a file
    wc -w file.txt → count words in a file


    System shutdown and reboot

    command

    description

    shutdown

    shut down a system
    shutdown -h now → immediately shut down the system
    shutdown -r now → immediately reboot the system
    shutdown -h +10 → shut down after 10 minutes

    reboot

    reboot the system

    halt

    halt the system immediately

    poweroff

    power off the system

    init

    change the runlevel (old-style system manager)
    init 0 → shutdown
    init 6 → reboot


    File system mounting and management

    command

    description

    mount

    mount a file system
    mount /dev/sda1 /mnt → mount partition to a directory

    umount

    umount a file system
    umount /mnt → unmount the file system mounted at /mnt

    fstab

    file system table
    configuration file for mounting file systems

    blkid

    display block device attributes

    fsck

    check and repair a file system
    fsck /dev/sda1 → check and repair /dev/sda1


    Filesystem permissions and security

    command

    description

    chmod

    change file permissions
    chmod 755 file.txt → give read write and execute permissions to owner
    and read/execute permissions to others

    chown

    change file owner and group
    chown user:group file.txt → change owner and group of a file

    chgrp

    change group ownership of a file
    chgrp group file.txt → change the group of a file

    umask

    set default permissions for new files
    umask 022 → set default permissions for newly created files to 755

    setfack

    set access control lists (ACL) for file permissions

    getfacl

    get access control lists (ACL) for file permissions


    Docker (containerization and orchestration)

    command

    description

    docker

    docker command line (CLI) for managing containers

    docker run image

    run a container from an image

    docker ps

    list running containers

    docker ps -a

    list all containers including stopped ones

    docker build -t imagename .

    build an image from a dockerfile

    docker exec -it container_id bash

    start an interactive bash shell inside a running container

    docker stop container_id

    stop a container

    docker rm container_id

    remove a container

    docker logs container_id

    view logs of a container

    dock images

    list available images

    docker rmi imagename

    remove an image

    docker network ls

    list docker networks

    docker-compose

    manage multi-container docker applications

    docker-compose up

    start up a multi-container environment

    docker compose down

    stop and remove containers created by docker-compose

    docker-compose logs

    view logs from containers managed by docker-compose


    Kubernetes (k8s) (containerization and orchestration)

    command

    description

    kubectl

    command line tool for interacting with Kubernetes clusters

    kubectl get pods

    list pods in the current namespace

    kubectl get nodes

    list nodes in the cluster

    kubectl get services

    list services in the cluster

    kubectl apply -f file.yaml

    apply configuration from a file

    kubectl create -f file.yaml

    create a resource from a file

    kubectl delete -f file.yaml

    delete a ressource defined in a file

    kubectl exec -it podname --bash

    execute a command inside a pod (ex. open a shell)

    kubectl logs podname

    view the logs of a pod

    kubectl describe pod podname

    get detailed information about a pod

    kubectl scale deployment deploymentname --replicas=number

    scale a deployment to the desired number of replicas

    kubectl rollout restart deployment deploymentname

    restart a deployment

    kubectl port-forward pod podname localport:remoteport

    forward a port from a pod to localhost


    Helm (containerization and orchestration)

    command

    description

    helm

    Kubernetes package manager for deploying applications

    helm install releasename chartname

    install a helm chart

    helm upgrade releasename chartname

    upgrade a helm release

    helm list

    list all helm releases

    helm delete releasename

    delete a helm release

    helm search chartname

    search for a helm chart


    Automation and configuration management

    Ansible

    command

    description

    ansible

    automation tool for configuration management

    ansible all -m ping

    ping all hosts defined in the inventory

    ansible-playbook playbook.yml

    run an ansible playbook

    ansible -m command -a 'command' host

    run a single command on a target host

    ansible-playbook --check playbook.yml

    dry run a playbook to see what would change

    ansible-playbook --limit host playbook.yml

    run a playbook on a specific host or group

    ansible-playbook --extra-vars "key=value"

    pass extra variables to a playbook


    Terraform

    command

    description

    terraform

    infrastructure as code tool for provisioning and managing cloud ressources

    terraform init

    initialize a working directory for terraform configuration

    terraform plan

    show an execution plan (what changes would be made)

    terraform apply

    apply the changes described in a terraform configuration

    terraform destroy

    destroy infrastructure created by terraform

    terraform validate

    validate the configuration files

    terraform show

    show the current state of the infrastructure


    Puppet

    command

    description

    puppet

    configuration management tool

    puppet apply manifest.pp

    apply a puppet manifest locally

    puppet agent ---test

    test the puppet agent

    puppet resource

    show the current state of resources
    (files, services, etc.)


    CI/CD tools and commands

    Jenkins

    command

    description

    jenkins

    continous integration tool

    java -jar jenkins.war

    start jenkins from a war file
    access jenkins trough http://localhost:8080 by default


    GitLab CI

    command

    description

    .gitlab-ci.yml

    configuration file for GitLab CI/CD pipelines

    gitlab-runner register

    register a new runner with GitLab

    gitlab-runner run

    run the Gitlab Runner to process jobs


    GitHub Actions

    command

    description

    Info

    GitHub Actions uses YAML configuration files
    typically located in .github/workflows/

    actions/checkout@v2

    checkout the repository code in your CI pipeline

    actions/setup-node@v2

    setup Node.JS for use in a pipeline

    docker/setup-buildx-action@v1

    set up docker buildx for building multi platform images


    Cloud Services

    AWS CLI (Amazon Web Services)

    command

    description

    aws

    command line tool for managing AWS services

    aws configure

    configure AWS CLI with your credentials

    aws s3 cp file.txt s3://bucketname/

    copy a file to an S3 bucket

    aws ec2 describe-instances

    descripe EC2 instances

    aws ec2 start-instances --instance-ids id

    start an EC2 instance

    aws ec2 stop-instances --instance-ids id

    stop an EC2 instance

    aws s3 sync

    sync directories with an S3 bucket


    Azure CLI (Microsoft)

    command

    description

    az

    command line tool for managing Azure services

    az login

    log in to your Azure account

    az vm list

    list all virtual machines

    az vm start --name vmname --resource-group resourcegroup

    start an Azure VM

    az storage blob upload

    upload files to an Azure blob storage

    az group create

    create a new resource group in Azure AD


    Google Cloud SDK

    command

    description

    gcloud

    command line tool for Google cloud platform

    gcloud auth login

    log in to Google cloud

    gcloud compute instances list

    list compute instances

    gcloud compute instances stop instancename

    stop a Google cloud VM instance

    gcloud ap browse

    open the current Google app engine application in a browser


    Logging and Monitoring


    Prometheus

    command

    description

    prometheus

    open source system monitoring and alerting toolkit
    start prometheus server (usually as a background service)

    prometheus --config.file=configfile

    start prometheus with a specific config file


    Grafana

    command

    description

    grafana-cli

    command line interface for managing Grafana plugins

    grafana-cli plugins install pluginname

    install a plugin in Grafana


    ELK Stack (Elasticsearch, Logstash, Kibana)

    command

    description

    elasticsearch

    search engine for logging and data analytics

    curl -XGET 'localhost:9200/_cluster/health?pretty'

    get cluster health status

    logstash

    server side data processing pipeline

    logstash -f configfile

    run logstash with the specified configuration file

    kibana

    web interface for visualizing Elasticsearch data
    Kibana is generally access through web on http://localhost:5601

    Every folder under Linux has it's meaning.

    Folder

    What it contains

    /bin

    Essential command binaries

    /boot

    System boot loader files

    /dev

    Device files

    /etc

    Host specific system wide configuration files

    /home

    User home directory

    /lib

    Shared library modules

    /media

    Media file such as DVD-ROM

    /mnt

    Temporary mounted filesystem

    /opt

    Add-on application software packages

    /proc

    Automatically generated file system
    Interface to kernel data structures

    /root

    Home directory for root user

    /run

    Runtime program data

    /sbin

    System binaries

    /srv

    Site specific data served by this system

    /sys

    Virtual directory providing information about the system

    /tmp

    Temporary files

    /usr

    Read-only user files
    Unix System Ressources

    /var

    Files that are expected to continuously change


    Command

    Description

    ls

    lists contents of a directory just like dir under DOS

    cat

    concatenate and print files

    grep

    searches for specific results with pattern

    clear

    clear the terminal

    cd

    change directory

    pwd

    print the working directory

    mkdir

    creates (make) a directory

    rmdir

    delete (remove) a directory

    man

    prints the manual pages of a specific tool

    which

    returns the path to an executable

    find

    searches for files in a directory hierarchy

    locate

    searches for files in a system using a prebuilt database

    who / whoami

    display all logged in users / current user

    id

    returns user ID

    chmod

    changes permissions and mode flags of a file or directory

    uname

    prints operating system's name (unix name)

    ifconfig

    network interface configuration of the system

    ip

    display and configure network parameters

    sudo / su

    executes a command as a different user
    by default the superuser
    open a sessions a s superuser

    ps

    lists the running processes status

    kill

    sends a kill signal to a process

    head

    view the first lines of any text

    mv

    move files

    cp

    copy files

    What it does

    Command

    Details

    Host Discovery

    nmap -sn target

    Disables port scanning and performs
    host discovery to identify live hosts

    Port Scanning

    nmap -p port_range target

    Scans specified ports or
    port ranges on the target

    Service Version Detection

    nmap -sV target

    Detects version of services
    running on open ports

    Operating System Detection

    nmap -O target

    Identifies the operating system
    of the target host

    Aggressive Scan

    nmap -A target

    Performs OS detection, version detection
    script scanning and traceroute

    UDP Scan

    nmap -sU -p port_range target

    Scans specified UDP ports on target

    TCP Connect Scan

    nmap -sT target

    Performs a TCP connect scan
    to determine if ports are open or closed

    SYN Scan

    nmap -sS target

    Performs a stealth SYN scan to identify
    open ports without completing the
    TCP handshake

    Firewall Evasion

    nmap -T"0-5" target

    Adjusts timing templates to evade
    firewalls and intrusion
    detection systems

    Scan from File

    nmap -iL input_file target

    Reads target hosts from a file and
    performs the scan

    Scan All Ports

    nmap -p target

    Scans all 65, 535 ports on
    the target

    Service Enumeration

    nmap --script script_name target

    Uses Nmap Scripting Engine (NES)
    scripts to enumerate services and
    gather additional information

    Scan Specific Ports

    nmap -p port1,port2 target

    Scans specific ports on the target


    Addresses

    Host

    Netmask

    Amount of a Class C

    /30

    4

    2

    255.255.255.252

    1/64

    /38

    8

    6

    255.255.255.248

    1/32

    /28

    16

    14

    255.255.255.240

    1/16

    /27

    32

    30

    255.255.255.224

    1/8

    /26

    64

    62

    255.255.255.192

    1/4

    /25

    128

    126

    255.255.255.128

    1/2

    /24

    256

    254

    255.255.255.0

    1

    /23

    512

    510

    255.255.254.0

    2

    /22

    1024

    1022

    255.255.252.0

    4

    /21

    2048

    2046

    255.255.248.0

    8

    /20

    4096

    4094

    255.255.240.0

    16

    /19

    8192

    8190

    255.255.224.0

    32

    /18

    16384

    16382

    255.255.192.0

    64

    /18

    32768

    32766

    255.255.128.0

    128

    /16

    65536

    65534

    255.255.0.0

    256

    Guide to sub-class C blocks

    Network #

    IP Range

    Broadcast

    .0

    .1 - .126

    .127

    .128

    .129 - .254

    .255

    /25 -- 2 Subnets -- 126 Hosts/Subnet

    If you ever needed a Machine Name for an IP Address you can simply try this PowerShell command (always run as administrator).

    Code
    $ComputerIPAddress = '10.10.10.10'
    [System.Net.Dns]::GetHostEntry($ComputerIPAddress).HostName


    There is an alternative to get more information while connection to the Active Directory (if available).

    Code
    import-module activedirectory
    $ComputerIPAddress = '10.10.10.10'
    Get-ADComputer -property * -filter { ipv4address -eq $ComputerIPAddress }

    Here are some useful commands regarding the DNS cache, resolve etc.


    I had recent attacks on my Linux server and so I was searching on how to add an IP drop with my firewall.

    On my Sites I have a security system that blocks already many things but unfortunately not all.

    And so here I show you an example on how to do it (at least how I did it).


    Example - You want to add an IP that is already exisiting


    Reload firewall - if all is ok you'll get a success


    Checking the state will show you if it's running or it's stopped


    With list-all you gonna see the current settings - so also what is allowed (here logicaly obfuscated)

    PAN

    Personal Area Network A personal area network (PAN) is a computer network for interconnecting electronic devices within an individual person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants.

    LAN

    Local Area Network A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home.

    WLAN

    Wireless Local Area Network A wireless local area network (WLAN) is a network that transmits information using electromagnetic waves or light, allowing devices to connect to the internet or other devices without the need for physical cables. WLANs are commonly used for wireless internet access in homes, offices, and public places.

    CAN

    Campus Area Network A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. Most CANs connect to the public Internet.

    MAN

    Metropolitan Area Network A metropolitan area network (MAN) is a network that covers a smaller geographical area such as a city or a large college campus system. Good examples of MANs are the local telephone company and your local cable TV company. MANs are also widely used in large companies and in governments to interconnect their computers.

    WAN

    Wide Area Network A wide-area network (WAN) is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It is called a wide-area network because it spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.

    SAN

    Storage Area Network A Storage Area Network (SAN) is a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space.

    SANS

    System Area Network A system area network (SAN) is a group of devices that are linked by a high-speed, high-performance connection. A SAN connection uses Internet Protocol (IP) addresses, which are assigned by TCP/IP to each SAN network interface controller (NIC), to determine data routing.

    POLAN

    Passive Optical Local Area Network A Passive Optical Network (PON) utilizes fiber-optic technology to distribute data from one source to multiple endpoints. The term "passive" denotes the use of optical fiber cables linked to an unpowered splitter, which transmits data from the service provider's network to numerous customers.

    EPAN

    Enterprise Private Network An Enterprise Private Network (EPN) is a computer network built by a business to interconnect its various company sites such as production sites, offices, and shops. This private network allows companies to share resources and communicate effectively.

    VPN

    Virtual Private Network A VPN protects its users by encrypting their data and masking their IP addresses. This hides their browsing activity, identity, and location, allowing for greater privacy and autonomy. Anyone seeking a safer, freer, and more secure online experience could benefit from a VPN.

    Virtual Private Network - VPN

    • NordVPN
    • ExpressVPN
    • Cisco AnyConnect
    • Juniper Networks VPN


    Cloud Based Security Brokers - CASB

    • Microsoft Cloud App Security
    • Bitglass Total Cloud Security
    • Netskope Security Cloud
    • McAfee MVISION Cloud


    Antivirus / Antimalware

    • Symantec Endpoint Protection
    • McAfee Endpoint Prtoection (now Trellix)
    • Kaspersky Endpoint Protection
    • ESET Endpoint Protection

    I personally recommend to just use the Microsoft Defender


    Endpoint Detection and Reponse (EDR)

    • CrowdStrike Falcon
    • SentinelOne
    • Carbon Black (part of VMWare)
    • Sophos Intercept X


    Firewalls

    • Cisco ASA with FirePOWER
    • Palo Alto Networks Next-Generation Firewalls
    • Fortinet FortiGate
    • Check Point Next Generation Firewall


    Identity and Access Management (IAM)

    • Okta
    • Microsoft Azure Active Directory
    • Duo Security (Cisco)
    • SailPoint IdentiIQ


    Intrusion Detection and Prevention Systems (IDPS)

    • Snort
    • Cisco Firepower
    • Palo Alto Networks Threat Prevention
    • Check Point SandBlast


    Security Information and Event Management (SIEM)

    • Splunk Enterprise Security
    • IBM QRadar
    • LogRhythm NextGen SIEM Platform
    • AlienVault USM (AT&T Cybersecurity)


    Secure Web Gateways (SWG)

    • Zscaler Internet Access
    • Symantec Web Security Service
    • McAfee Web Gateway
    • Forcepoint Web Security


    Network Access Control (NAC)

    • Cisco Identity Services Engine (ISE)
    • Aruba ClearPass
    • Forescout Counter ACT
    • Portnox CORE


    Email Security

    • Trustifi AI-Security
    • Barracuda Email Security Gateway
    • Proofpoint Email Protection
    • Mimecast Secure Email Gateway
    • Cisco Email Security


    Data Loss Prevention (DLP)

    • Symantec Data Loss Prevention
    • Digital Guardian
    • McAfee Total Protection for Data Loss Prevention
    • Forcepoint DLP
    Rating
    4/5
    Good

    Ratings

    These ratings are my personal opinion - Your Opinion maybe different than mine!


    Graphics

    5 out of 5

    Difficulty

    4 out of 5

    Steam Deck

    4 out of 5

    ROG Ally - Bazzite

    4 out of 5


    Description

    Vessel of Hatred is a paid expansion for Diablo 4 that comes with new ways to play and new evils to vanquish. Players get to choose whether they want to continue playing the base game of Diablo 4 or purchase the expansion and experience its contents.

    EMBRACE THE SHADOWS!
    A new region of Hell is coming to Diablo IV on October 8 - 2024! Vessel of Hatred is the first expansion and next chapter of the genre-defining, award-winning series by Blizzard Entertainment. Pre-purchase now for immediate access to in-game rewards and prepare for the darkness that awaits you as the first expansion charges through the land of Sanctuary.

    NEW CLASS: SPRIRITBORN
    Ranked among the apex predators of the jungle, the Spiritborn is an entirely new class to the Diablo series. They are battle-hardened with mystical synergies that could only be awakened deep within the jungles of Nahantu. Become one of the Spiritborn and embrace the ethereal Spirits entwined with this ancient civilization.

    NEW REGION: NAHANTU
    Explore Nahantu, the new jungle region in Diablo IV full of secrets, dangerous new Dungeons, Strongholds, and ferocious demons from warring Tribes.

    CONTINUE THE CAMPAIGN
    Set immediately following the events of Diablo IV, Vessel of Hatred continues the dark story as you fight to save Neyrelle from Mephisto's tightening grip on her soul, still reeling from the choice she made to contain him. The search for Neyrelle takes you deep into the ancient jungle as she grapples with the imprisoned Prime Evil. Attempt to unravel Mephisto’s dark plot while new foes encircle your every move, planning your demise. The fate of Neyrelle’s soul - and her ability to stop this Prime Evil from destroying Sanctuary - rests in your hands.

    Never fight alone as new Mercenaries can join you on your quest to fight in the dense undergrowth of Nahantu and beyond. These powerful allies grow in power as they progress, and each are equipped with unique abilities to help you in combat.

    NEW GAME UPDATES
    Vessel of Hatred also has huge updates for all Diablo IV players with new class skills, paragon boards, legendary glyphs, dungeon types, Tree of Whispers activities, and more.

    A new co-op PvE mode where you work with your friends to complete objectives and slay the boss in a multi-level dungeon, while getting loot and rewards.

    My Opinion

    As I can't play daily it always take some time until I finish my test but what should I say? I simply love Diablo IV as I loved the Diablo games before.

    The new class is great as also the new area.

    The story continues which is great and it take several hours to finish it but there is such abrupt ending...
    I thought it would continue but it was the end and so we can say the next DLC will come with the continuing story...

    For end gaming content I'm not the one to ask - here you need to ask people that don't have any life and play daily for hours and hours.

    But I would always recommend this game 🙂


    Requirements


    Minimum

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-2500K
    AMD FX 8350

    Memory (RAM)

    8 GB

    Graphics processing unit (GPU)

    Nvidia Geforce GTX 660
    Intel Arc A380
    AMD Radeon R9 280

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p native resolution
    720p rendered resolution
    low graphics settings
    30 FPS
    SSD required


    Recommended

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-4670K
    AMD Ryzen 1300X

    Memory (RAM)

    16 GB

    Graphics processing unit (GPU)

    Nvidia GTX 970
    Intel Arc A750
    AMD Radeon RX 470

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p resolution
    medium graphics settings
    60 FPS
    SSD required


    Trailer etc.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.


    Related links (non affiliate!)

    Steam
    Blizzard
    Instant Gaming


    Photos / ScreenShots