Penetration Testing Course – ict4tn027-3001 – Autumn 2018 – period 1 – 5 op

Update: The first course got excellent feedback: 4.9 out of five. Thank you! We have a new course starting on 2019 w21 Monday. I will teach the new penetration testing course. Name: Penetration Testing – Tunkeutumistestaus Code: ict4tn027-1 Teaching language: … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | 110 Comments

Automaticaly Build Penetration Testing Environment – Kali, Metasploitable, Vagrant

My student Toni Jääskeläinen developed a PenTest environment that can be set up automatically. Based on my idea, it’s distributed as a single Vagrantfile. Using pentest tools requires special care and skill, as even mistakes with some of these tools … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Automaticaly Build Penetration Testing Environment – Kali, Metasploitable, Vagrant

Prefer IPv4 on Ubuntu 16.04 LTS xenial – /etc/gai.conf

New Ubuntu 16.04 LTS Xenial prefers IPv6 connections. In some networks, this breaks software updates. You can easily fix this by making Ubuntu prefer IPv4 connections over IPv6.

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Prefer IPv4 on Ubuntu 16.04 LTS xenial – /etc/gai.conf

Security Researcher Ali Dehghantanha visits Haaga-Helia – w14 Wednesday 09:00

Doctor Ali Dehghantanha will visit HH from Salford University. He’ll give a presentation on computer security. Haaga-Helia auditorium, w14 Tuesday Wednesday 2016-04-05 09:00 … 12:00 The event is open for Haaga-Helia students and staff. UPDATE: Day changed to WEDNESDAY. Time … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | 2 Comments

Forensic File Recovery with Linux – Undelete

Want your deleted files back? Plan A: have backups. Plan B: take a disk image and use a tool to undelete your files. If you are doing forensic analysis, file recovery is your only option. Prequisites: fluency with the command … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on Forensic File Recovery with Linux – Undelete

Cyber Security Day in Haaga-Helia

Protect your systems against cyber crime. Preliminary agenda and description in Finnish. The event is completely in English. Free registration, open to all. Auditorium in Haaga-Helia Pasila, Helsinki. w39 Tue 2013-09-24 at 13:00.

Posted in Uncategorized | Tagged , , , , , | Comments Off on Cyber Security Day in Haaga-Helia

PGP – Sähköpostin salakirjoitus

Table of Contents PGP – Sähköpostin salakirjoitus Asenna Linuxissa Windowsissa Luo avainpari (kaikissa käyttöjärjestelmissä) PGP – Sähköpostin salakirjoitus Kun salakirjoitat sähköpostisi, ulkopuoliset eivät pääse urkkimaan tietojasi. PGP on suosituin tapa salata sähköpostia, eikä suotta. Se on ilmainen ja toimii Linuxilla, … Continue reading

Posted in Old Site | Tagged , , , , , | 1 Comment

Ssh public key authentication

Ssh public key authentication How to set up public key authorization with linux distributions using openssh, such as Fedora, Red Hat or Debian. In this howto, you are on your own computer (whose name is local) as user erkki. You … Continue reading

Posted in Old Site | Tagged , , , | Comments Off on Ssh public key authentication

NAT iptables – share internet connection and ip-number

NAT iptables – share internet connection and ip-number Network Address Translation (NAT) means that one computer shares single internet connection and single ip to many computers. Internet connection is a critical part of network, so stability and security make Linux … Continue reading

Posted in Old Site | Tagged , , , , , | Comments Off on NAT iptables – share internet connection and ip-number