Automaticaly Build Penetration Testing Environment – Kali, Metasploitable, Vagrant

My student Toni Jääskeläinen developed a PenTest environment that can be set up automatically. Based on my idea, it’s distributed as a single Vagrantfile. Using pentest tools requires special care and skill, as even mistakes with some of these tools … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Automaticaly Build Penetration Testing Environment – Kali, Metasploitable, Vagrant

Automation of Router Configuration with Python & SSH

My student Joram is automating router configuration for NDC Networks. Joram configures Advantech B+B routers for NDC’s clients. The configuration is done using custom built Python Paramiko SSH script. The routers are configured for clients of NDC, an 8 person … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Automation of Router Configuration with Python & SSH