Learn how to setup a open source password manager called bitwarden on docker and use traefik as our http proxy with letsencrypt
Security
A collection of 13 posts
IAM Policy to Allow Team Wide and User Level Permissions on AWS Secrets Manager
In this post we will simulate a scenario where a team would like to have access to create secrets under a team path name like /security-team/prod/* and /security-team/dev/* and allow all the users from that team to be
Capturing 54 Million Passwords with a Docker SSH Honeypot
The last couple of days I picked up on my ELK Stack a couple thousands of SSH Brute Force Attacks, so I decided I will just revisit my SSH Server configuration, and change my SSH Port to something else for
Distributing a Shared Secret amongst a Group of Participants using Shamirs Secret Sharing Scheme aka ssss
In situations where a group of participants join together to split up a secret in a form of secret sharing, where the secret is devided into parts, giving each participant their own unique part. Together contributing to reconstruct the initial
Salt and Hash Example Using Python With Bcrypt on Alpine
This is a post on a example of how to hash a password with a salt. A salt in cryptography is a method that applies a one way function to hash data like passwords. The advantage of using salts is
Encryption and Decryption with the PyCrypto module using the AES Cipher in Python
While I'm learning a lot about encryption at the moment, I wanted to test out encryption with the PyCrypto module in Python using the Advanced Encryption Standard (AES) Symmetric Block Cipher. #carbonads { font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu,
Encryption and Decryption with Simple Crypt using Python
Today I wanted to encrypt sensitive information to not expose passwords, hostnames etc. I wanted to have a way to encrypt my strings with a master password and stumbled upon Simple Crypt. window.dojoRequire(["mojo/signup-forms/Loader"], function(L) { L.
Nginx Basic Authentication with Source IP Whitelisting
Quick post on how to setup HTTP Basic Authentication and whitelist IP Based Sources to not get prompted for Authentication. This could be useful for systems interacting with Nginx, so that they don't have to provide authentication. #carbonads { font-family: -apple-system,
Subscribe to Sysadmins
Subscribe today and get access to a private newsletter and new content every week!