This section offers practical, hands‑on guides for building, securing, and monitoring infrastructure. It covers a range of security engineering topics, including penetration testing environments, local model deployment, and advanced configuration of systems to improve security posture.
- Capture the Flag Exercises: Part ThreeAdding security monitoring to our CTF platform.
- Capture the Flag Exercises: Part TwoAdding vulnerabilities into our CTF environment using Ansible.
- Capture the Flag Exercises: Part OneSetting up an infrastructure penetration testing CTF.
- Local Large Language ModelsRunning LLM’s on Ubuntu.
- VXLAN’sConfiguring VXLan’s in Linux.
- x64 Call Stack WalkingWalking an x64 call stack using UNWIND data structures.
- Headless Linux Disk EncryptionUnlocking LUKS encrypted disks remotely.
- Blocking Outbound Docker TrafficBlocking outbound docker traffic using an IPTables firewall.
- PowerShell Constrained ModeA guide to enabling PowerShell constrained mode.
- Kali OpenVPN KillswitchEnsuring all network traffic is routed over an OpenVPN connection.
- Software Restriction PoliciesConfiguring Software Restriction Policies (SRP) in Windows 10.
- Active Directory Honey TokensConfiguring Active Directory honey tokens to detect account enumeration.
- Creating a WPA2 Enterprise Access PointA guide to configure a Linux system as a WPA2 Enterprise wireless access point using an Alpha wireless adapter.