Posts by Year

2022

21 Musings From Incident Response

7 minute read

These are my personal anecdotal conclusions and I totally appreciate it may not line up with anyone else’s. This is US centric, as that is my experience, a...

Back to Top ↑

2015

Specialty Packet Capture

2 minute read

Situations where it’s useful to analyze traffic: Don’t have access to the logs Want to look at traffic somewhere upstream like an LB Something is mak...

Back to Top ↑

2014

Back to Top ↑

2013

SUP Intro DevOpsKC

less than 1 minute read

I walked through these slides demonstrating the simple tool sup.py I wrote at the devops kc meetup. Sup can be used in place of ping/tcping/httping on some o...

Stateless Sampling

4 minute read

In the devops world there are a lot of reasons to want good stats, but sometimes the load for collecting those stats on every execution of a script or web p...

Using Snort on a PCAP file

less than 1 minute read

Grabbing tcpdump output during a crisis can be hard to remember. Ideally, snort is running as as service inline or at least continually. Sometimes things hap...

Bash Troubleshooting Boilerplate

less than 1 minute read

I have a bash script that is being called multiple times instead of once. I need to track down where it is being called from.

Syn Flood Testing

1 minute read

Launching a SYN flood. Everyone know DDOS attacks happen and of these SYN floods may be the simplest to organize for attackers. As a defender you don’t want...

Time Machine?

less than 1 minute read

SRE: “When does it need to be done?” PM: “Next week at the latest.” SRE: “OK, we spend from now to next week working on a time machine. If we ha...

deviantART Registrar Name.com Compromised

less than 1 minute read

So name.com was hacked and deviantart.com was one of the credentials dumped from their DB. How do I know? Name.com Tells Customers To Change Password Due To...

Beginning IOS BGP Configuration

2 minute read

This configuration is Cisco based but JunOS isn’t too far of a stretch in my experience. First off: you need your ASN. You need your address block. Your add...

Beginning BGP

5 minute read

I remember hearing a lot of conflicting information about BGP when I first started doing network admin stuff. A lot of time BGP is part of an HA strategy and...

Halting a KVM guest with virsh

less than 1 minute read

KVM is great but I’m making a note so I remember because this command gives me pause every time. When a new VM has no OS or doesn’t make it past the bootloa...

IOS Granular Permissions

less than 1 minute read

If you have tiered levels of administrators, or you want to create an account for automation purposes best practice is to define a custom security level in I...

Back to Top ↑

2012

Examining Pxe Boot

2 minute read

I have a host with MAC 00:30:48:60:f3:ca. This host is configured to look for a PXE server, but was not matching the correct profile.

Basic Python JSON REST API Client Example

less than 1 minute read

JSON REST API’s are increasingly common and useful. A basic client example for using something like nagios api import sys import os import urllib import js...

Convert Cisco Octets to Mbps

less than 1 minute read

Depending on the type of counter you want to track you can use one of the two SNMP following OIDs ‘64’ bit counter => oid => ‘.1.3.6.1.2.1.31.1.1.1’ ...

Proxychains

1 minute read

Some commands do not natively support a proxy (RE: telnet). Other times it is just easier to do a one-off instance rather than mess with environment setting...

Newby Voicemail

less than 1 minute read

My second day at a job in 2007 I showed up early. I came in the unlocked front doors and I set off an insane alarm.

Back to Top ↑