Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Wombat ThreatSim Phishing Simulations serivce has SaaS-based interface which makes it easy to deliver simulated phishing emails and customizable Teachable Moments, which display targeted “just-in-time teaching” messages to individuals who fall for a phishing test.ThreatSim’s customizable email templates address…
Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installation)
1. Ubuntu16.04 Installation 1.1 VMware Workstation Virtual Machine Creation for not easy installation If you are using VMware workstation , by default, system will do easy installation for you, which means all settings will be automatically entered by VMware Workstation. You wont need to provide too much or any information during installation process. We are not going to use this…
Expose your local service to public: Ngrok, FRP, localtunnel
For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world in a secured manner. Unfortunately, we work most of the time from private IP networks, be that at the workplace, at home or at the coffee shop. The router(s) or firewall (s) that stands between our workstation…
Gartner Magic Quadrant for Enterprise Network Firewall (2018,2017,2016,2015,2014,2013,2011,2010)
Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versions for the data center. Customers should also have the option to…
Gartner Magic Quadrant for SIEM Products (2018,2017,2016,2015,2014,2013,2012,2011…)
Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applications. Products in the security information and event management (SIEM) market analyze security event data and network flow data in real time for internal and external threat management. They collect, store, analyze and report on log data for incident response, forensics and…
According to wikipedia Iperf “is a commonly used network testing tool that can create TCP and UDP data streams and measure the throughput of a network that is carrying them. Iperf is a modern tool for network performance measurement written in C++.” This tool has to configure server side and client side to complete a test. It can test from…
Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2018 Gartner Magic Quadrant for Unified Threat Management Report For leaders quadrant, no changes since 2015. Fortinet, Check Point and Sophos are in there. Related
ArcSight SIEM Logger Web, Search Examples, Use Case Reports
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Security Operations. As a result, organizations of any size can use this high performance log data repository to aid in faster forensic analysis of IT operations, application development, and cyber security issues, and to simultaneously…
1.1 VMware Workstation Virtual Machine Creation for not easy installation
If you are using VMware workstation , by default, system will do easy installation for you, which means all settings will be automatically entered by VMware Workstation. You wont need to provide too much or any information during installation process. We are not going to use this method in this post. We just choose the option “I will install the operating system later” to skip easy installation.
Easy Install vs Non Easy Install
1.2 Ubuntu 16.04.5 LTS Installation Steps
Choose ‘No’,for Configure the keyboard, enter
Select English (US), Enter
If you have multiple network cards, you will have to choose one as the primary network interface to configure it.
It will try to automatically configure it.
DHCP configuration failed，Enter.
Manually configure it
Configure an ip
name server can be set as blank if you do not have one.
If DHCP was successful to get you all ip information, or you manually configured it, next step is to configure Hostname
domain name is empty
Create a new user: test
Enter to continue
Set up password
Confirm password and enter
Choose Yes to confirm to use weak password
Choose No , not to encrypt home folder.
Installation program will pick a time zone based on your ip location.
If your location could not be located, you will choose a time zone manually.
Partition disks configuration:
Enter for http proxy information since we do not have one.
Choose no auto update:
Install the service. For us, just need core. no others.
Install GRUB Boot loader
System installation completed, you can try to log in with Putty or SecureCRT client software.