Articles from ADMIN Issue 86
The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.
This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Slowloris can help you harden your web servers against denial-of-service attacks that restrict the availability of web services.
Open-AudIT inventories, manages, and monitors IT assets, whether hardware, software, network device, or virtual machine. We explain how to install the software and work through the initial configuration.
OTOBO is a user-friendly and completely free ticket system designed to handle complex service requirements that offers an alternative, easy-to-use support tool with Active Directory integration and single sign-on. We show you how to set up and configure OTOBO and how to connect it to third-party systems such as Entra ID.
The Tactical RMM open source tool offers a combination of remote monitoring and management, with agents to support Linux, macOS, and Windows.
The GNU Stow tool in combination with Ansible can help you manage configuration files.
Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Many experienced administrators find that Active Directory is particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.