Articles by Ali Imran Nagori
-
How to Configure Path-Based routing in an AWS Application Load Balancer
Author: Ali Imran Nagori • Tags: cloud, linux • Comments: 1 • Published: Apr 07, 2022In AWS, ELB and Elastic Load Balancing exists a concept where the servers can be added or released as per the demand of our application and the incoming traffic from an application is distributed among multiple targets. In this tutorial, we will configure path-based routing for an Application Load Balancer on AWS. We are going to use an IAM user account for this task.
-
4 CLI based Linux Performance Monitoring Tools: top, htop, ps and vmstat
Author: Ali Imran Nagori • Tags: linux • Comments: 1 • Published: Mar 18, 2022In this guide, we will present some of the commonly used command-line-based tools for monitoring system performance. We are using Ubuntu 20.04 OS for this guide, although the tools we are going to discuss are available for most Linux-based distros.
-
Exploring the Lynis Audit Report
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Mar 14, 2022Lynis is a free and open-source security auditing tool and released as a GPL licensed project and is available for Linux and Unix-based Operating systems. In this tutorial, we will try to explore the Lynis audit report and learn to apply some of the reforms it suggests. Let's now get started with this guide.
-
-
Linux Security Auditing with Lynis
Author: Ali Imran Nagori • Tags: linux • Comments: 0 • Published: Mar 01, 2022Lynis is a free and open-source security checker released under the GPL license and available for Linux and Unix-based operating systems such as MacOS, FreeBSD, NetBSD, OpenBSD, etc. In this article, we will explore how to install Lynis and conduct an audit of a Kali Linux system.
-
How to Audit a Remote Linux system with Lynis Security Tool
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Feb 22, 2022Lynis is a free and open-source security auditing tool released as a GPL licensed project and is available for Linux and Unix-based Operating systems. In this tutorial, we will provide instructions on how to perform a Lynis security audit on a remote system.
-
Introducing the Wireshark command Line Interface: The TShark
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Feb 14, 2022TShark is designed as a CLI or command-line interface of Wireshark for capturing and analyzing packets right from the CLI. In this tutorial, we will explain to you about TShark and present you with some basic use cases. Let’s dive in with TShark.
-
Capturing Packets with Tcpdump and analyzing them with Wireshark on Ubuntu
Author: Ali Imran Nagori • Tags: linux, security, ubuntu • Comments: 0 • Published: Feb 01, 2022In this guide, I will show you how to analyze network Packets on Linux. I will use the Tools Tcpdump and Wireshark. This tutorial uses Ubuntu as OS, but it is applicable to other Linux distributions too.
-
How to use Filters in Wireshark
Author: Ali Imran Nagori • Tags: monitoring, networking, security • Comments: 0 • Published: Jan 21, 2022Wireshark (Formerly Ethereal) is used for capturing and investigating the traffic on a network. In this guide, we are going to explore how to create and efficiently apply filters in Wireshark. Let us get started now.
-
How to use Wireshark for capturing and analyzing network packets
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Jan 12, 2022Wireshark (formerly Ethereal) is a FOSS (free and open-source software) for network protocol analyzer. In this guide, we will learn “How to use Wireshark for capturing and analyzing packets”.
-
How to configure a Nessus Vulnerability Scan Policy
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Dec 17, 2021In this guide we will explore how to configure a scan policy on Nessus, later we will also use this policy to create a scan. We will then select a target system for scanning.