Detecting rogue DHCP servers with MikroTik
Best practices for managing saved credentials in MikroTik Winbox.
Using named pipes to access serial consoles in Microsoft Hyper-V. Great way to interact with MikroTik CHR VMs without having tons of Winbox windows open.
Overview of IPv4, including public and private addresses, legacy classes, broadcast, APIPA, and more.
How to wipe MikroTik RouterBOARD devices so they can be repurposed.
Configuring bridged ports on MikroTik routers. How to combine ports together using a Master Port configuration and the new hardware bridging feature.
Ubiquiti IPv6 prefix delegation with SLAAC. Using IPv6 addresses assigned by a residential ISP with Ubiquiti routers.
Configuring NTP on EdgeOS Ubiquiti devices using pool.ntp.org and time.google.com servers.
Hardening steps for securing your MikroTik RouterOS devices. Includes user management, firewalls, IP services, and more.
MikroTik DDoS mitigation using prerouting rules and address lists.
Load balancing multiple WANs with MikroTik, including failover and detailed explanations of route and connection marks.
Firewalling zones using interfaces lists on Mikrotik routers.
Mikrotik firewall fundamentals and best practices, including firewall chains, actions, rules, and tips on optimizing your firewall.
Configuring VPLS tunnels using MPLS on Mikrotik routers.
Configuring FastTrack firewall rules on Mikrotik routers.
Configuring the Master Port on Mikrotik devices, to switch multiple ports together.
Limiting download speeds on Mikrotik routers, with PCQ Queues to throttle bandwidth.
Setting up site-to-site EoIP tunnels using Mikrotik routers.
Setting up site-to-site PPTP tunnels using Mikrotik routers.
Setting up a GRE over IPSEC VPN tunnel architectures using Mikrotik routers.
Setting up site-to-site IPSEC tunnels using Mikrotik routers.
VLAN trunking on Mikrotik routers. Configuring router-on-a-stick and routing between VLANs.
Port forwarding using NAT on Mikrotik routers.
Creating a site-to-site IPSEC VPN between two Ubiquiti EdgeRouters. We use robust encryption and implement best practices to secure communications between two locations.
Hardening steps for Ubiquiti routers, implementing security best practices and robust firewalling. This includes some best practices for securing Ubiquiti routers for PCI and HIPAA compliance.
Configuring the login banner on Ubiquiti routers.
Configuring Syslog logging on EdgeOS Ubiquiti devices.
Configuring SNMP monitoring on EdgeOS-based Ubiquiti products.
Configuring NTP on EdgeOS Ubiquiti devices using pool.ntp.org servers.
Network scanning with Nmap including ping sweeps, TCP and UDP port scans, and service scans.
Sending alert notifications to Windows users with the msg command.
Setting up the Metasploit Framework database in Kali and Ubuntu Linux. Save discovered hosts, services, and loot to the database using Metasploit Framework.
Running Kali Linux in Virtualbox using the prebuilt Kali Linux VM image.
Installing Metasploit Framework on Ubuntu Server.
Disabling and removing Adobe Flash for security in Firefox and Chrome.
Using macro payloads in Excel with Metasploit to gain access to client networks.
Finding wireless pre-shared keys (PSK) using Metasploit Framework and Powershell payloads from TrustedSec's Unicorn project.