On March 26th, 2018, I became a Certified Ethical Hacker. You see, I’m transitioning out of the military soon and I want to work in cyber security. A few months ago, I set in motion my plan to get two or three certifications that covered as much of the DoD Approved 8570 Baseline Certifications table as possible. I decided on pursuing the CEH and the CISSP (more on that in a later post; I passed!), which together would cover 12 of 14 categories/levels. Since I am writing this from the perspective of a transitioning service member, some of the resources I mention will be limited to and/or geared toward active service members and/or veterans. Also keep in mind that 12 days before I sat for my exam, EC-Council announced v10 of the CEH, as well as the CEH Practical. I would venture to guess v10 has much of the same material and that you would be ok using only these resources, but keep an eye out for updated versions of the resources I mention. Read More
When do you upgrade your home lab version? New hardware? New arrangement? I’m not really sure, so we’re going to go with v4.0.
This post is really just an overview of what the lab currently looks like and some of the functions it performs. A lot of it is more production than lab, so…labduction?
There she is, up there, in all of her cobbled together glory. And trust me, I’m cleaning up the cabling this weekend! I wish I’d known when I started what I know now, but I suppose that’s part of the reason we do this! Read More
In this article, we’ll configure On Demand VPN for iOS and macOS devices to connect to the VPN we created.
Part 4 – On Demand VPN
So you want to get your hands dirty and force your VPN to connect based on network states? You’ve come to the right place! First and foremost, you’ll need an editor that handles XML. I recommend Atom.
Inspired by a Reddit post1, I began to look into Apple’s options for forcing VPN connections through the use of Mobile Configuration Profiles2. One resource I found that was helpful was this post from derman.com. So open up your Mobile Configuration file and let’s get to work! Read More
In this article, we’ll configure an IKEv2 VPN in pfSense for our iOS and macOS devices to connect to.
At this point, we’ve configured our server certificates. Now let’s create the actual VPN. Read More
In this article, we’ll configure the certificates necessary to set up an IKEv2 VPN in pfSense.
This was setup and configured with the following: macOS 10.13 High Sierra Beta (should work with 10.12+, possibly older), and Apple Configurator 2.5 Beta (available from the Apple Developer site/release available on the App Store; should work with prior versions).
I recently replaced my home pfSense router, previously a Zotac CI323, with a Qotom Q355G4. While the Zotac was never a bad machine as a router, it wasn’t great, and as my needs began to expand, so too did my issues. I frequently experienced a complete failure of the WAN link, only solved by rebooting, and when running Suricata, a saturated WAN link meant a quick performance degradation to the point where I completely lost internet access and could not access the pfSense web interface or SSH. Read More