homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Network Security Basics: Connecting Safely – Part 5 of 5 of the Terminal Techniques for You (TTY): Making Linux Security Accessible Blog Series
CharlieGoldner_370x370.png
Charles Goldner

Network Security Basics: Connecting Safely – Part 5 of 5 of the Terminal Techniques for You (TTY): Making Linux Security Accessible Blog Series

Secure your Linux system by managing open ports, configuring firewalls, and using SSH best practices to minimize exposure to cyber threats.

April 15, 2025

Network Security Basics: Connecting Safely

Welcome to the fifth installment in our TTY series! In previous posts, we've covered how to navigate the Linux file system, keep your software updated, control file permissions, and manage processes. In this post, we'll explore network security basics, like how your Linux system connects to the outside world and how to protect those connections.

Network connectivity is essential for most systems today, but it’s also one of the primary attack vectors. Understanding how your Linux system communicates over a network and implementing a few basic security measures can significantly reduce your vulnerability to external threats.

Understanding Your Network Interfaces

Let's start by identifying how your system connects to the network. Network interfaces are the connection points between your computer and the outside world.

To view your network interfaces, you can use the `ip` utility with the `address` object and `show` command:

$ ip a show

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000

link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00

inet 127.0.0.1/8 scope host lo

valid_lft forever preferred_lft forever

inet6 ::1/128 scope host

valid_lft forever preferred_lft forever

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000

link/ether 00:16:3e:5e:6c:00 brd ff:ff:ff:ff:ff:ff

inet 192.168.1.100/24 brd 192.168.1.255 scope global dynamic eth0

valid_lft 86389sec preferred_lft 86389sec

inet6 fe80::216:3eff:fe5e:6c00/64 scope link

valid_lft forever preferred_lft forever

NOTE: You can abbreviate `address` as `addr` or `a`

In this example, we see two interfaces:

  • `lo`: The loopback interface (127.0.0.1), used for internal communications within your system.
  • `eth0`: An ethernet interface with the IP address 192.168.1.100. This is your connection to the local network!

You might also see interfaces like:

  • `wlan0`: Wireless network connection
  • `tun0` or `vpn0`: VPN connections
  • `docker0`: Docker container network bridge
  • `ens33`: A different naming convention for `eth0`

For older systems, you might use the `ifconfig` command instead:

$ ifconfig

If this command isn't found, you can install it with:

$ sudo apt install net-tools# For Debian/Ubuntu

Checking Network Connectivity

To test basic network connectivity, use the `ping` command:

$ ping -c 4 8.8.8.8

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.

64 bytes from 8.8.8.8: icmp_seq=1 ttl=53 time=11.6 ms

64 bytes from 8.8.8.8: icmp_seq=2 ttl=53 time=12.1 ms

64 bytes from 8.8.8.8: icmp_seq=3 ttl=53 time=11.9 ms

64 bytes from 8.8.8.8: icmp_seq=4 ttl=53 time=12.0 ms

--- 8.8.8.8 ping statistics ---

4 packets transmitted, 4 received, 0% packet loss, time 3006ms

rtt min/avg/max/mdev = 11.637/11.909/12.084/0.173 ms

The `-c 4` option limits the test to 4 packets. If we don't specify a count, ping just keeps going until you hit CTRL+C. This example shows a successful connection to Google's DNS server (8.8.8.8).

To test DNS resolution (converting hostnames to IP addresses):

$ host example.com

example.com has address 93.184.216.34

example.com has IPv6 address 2606:2800:220:1:248:1893:25c8:1946

Or use the `dig` command for more detailed DNS information:

$ dig example.com

; <<>> DiG 9.16.1-Ubuntu <<>> example.com

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40555

;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 65494

;; QUESTION SECTION:

;example.com.                                       IN             A

;; ANSWER SECTION:

example.com.                      86400   IN             A               93.184.216.34

;; Query time: 52 msec

;; SERVER: 127.0.0.53#53(127.0.0.53)

;; WHEN: Sat Mar 05 10:45:30 UTC 2023

;; MSG SIZE  rcvd: 56

If `dig` isn't installed, you can add it. Not sure how to do that? Review the second installment of our TTY post, System Updates and Package Management: Keeping Your System Safe.

Understanding Network Ports and Services

Services on your computer listen on specific network ports. These numbered endpoints help identify a particular service. For example:

  • Port 22: SSH (Secure Shell)
  • Port 80: HTTP (web traffic)
  • Port 443: HTTPS (secure web traffic)

To see which ports are open and listening on your system:

$ sudo ss -tulpn

Netid  State   Recv-Q  Send-Q     Local Address:Port     Peer Address:Port  Process

udp    UNCONN  0       0          127.0.0.53%lo:53       0.0.0.0:*          users:(("systemd-resolve",pid=571,fd=12))

udp    UNCONN  0       0          0.0.0.0:68             0.0.0.0:*          users:(("dhclient",pid=600,fd=6))

tcp    LISTEN  0       128        127.0.0.53%lo:53       0.0.0.0:*          users:(("systemd-resolve",pid=571,fd=13))

tcp    LISTEN  0       128        0.0.0.0:22             0.0.0.0:*          users:(("sshd",pid=950,fd=3))

tcp    LISTEN  0       128        127.0.0.1:631          0.0.0.0:*          users:(("cupsd",pid=696,fd=7))

tcp    LISTEN  0       128        [::]:22                [::]:*             users:(("sshd",pid=950,fd=4))

tcp    LISTEN  0       128        [::1]:631              [::]:*             users:(("cupsd",pid=696,fd=6))

The options mean:

  • `t`: Show TCP ports
  • `u`: Show UDP ports
  • `l`: Show only listening ports
  • `p`: Show the process using the port
  • `n`: Show numerical addresses and ports

From a security perspective, every listening port is a potential entry point to your system. The fewer ports you have open, the smaller your attack surface.

For a more comprehensive port scan, you can use the `nmap` tool:

$ sudo apt install nmap# Install if needed

$ sudo nmap -sT -O localhost

Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-05 10:50 UTC

Nmap scan report for localhost (127.0.0.1)

Host is up (0.000097s latency).

Not shown: 998 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

631/tcp open  ipp

Device type: general purpose

Running: Linux 4.X|5.X

OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5

OS details: Linux 4.15 - 5.6

Network Distance: 0 hops

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 1.73 seconds

This shows open ports and attempts to identify the operating system.

Use this tool responsibly: only on systems you own or have permission to scan.

Implementing a Basic Firewall

A firewall is your first line of defense against network-based attacks. Linux includes a powerful firewall called `iptables`, but for beginners, the `ufw` (Uncomplicated Firewall) makes configuration much easier.

First, install `ufw` if it's not already available:

$ sudo apt install ufw

Check the status:

$ sudo ufw status

Status: inactive

Before enabling the firewall, let's set up some basic rules to ensure we don't lock ourselves out:

$ sudo ufw allow ssh

$ sudo ufw allow 2222/tcp

$ sudo ufw allow http

$ sudo ufw allow https

Now enable the ufw firewall:

$ sudo ufw enable

Command may disrupt existing ssh connections. Proceed with operation (y|n)? y

Firewall is active and enabled on system startup

Check the status again to see your rules:

$ sudo ufw status

Status: active

To                         Action      From

--                         ------      ----

22/tcp                     ALLOW       Anywhere

80/tcp                     ALLOW       Anywhere

443/tcp                    ALLOW       Anywhere

22/tcp (v6)                ALLOW       Anywhere (v6)

80/tcp (v6)                ALLOW       Anywhere (v6)

443/tcp (v6)               ALLOW       Anywhere (v6)

By default, `ufw` blocks all incoming connections and allows all outgoing connections. This is a good starting point for most users.

To deny a specific port:

$ sudo ufw deny 23

To remove a rule:

$ sudo ufw delete allow 80/tcp

For more complex rules, you can specify IP addresses or ranges:

$ sudo ufw allow from 192.168.1.5 to any port 22

$ sudo ufw allow from 192.168.1.0/24 to any port 3306

Securing SSH: Your Remote Access Connection

Secure Shell (SSH) is commonly used for remote access to Linux systems. Since it provides powerful access, securing it properly is essential:

1. Edit the SSH configuration file:

$ sudo nano /etc/ssh/sshd_config

2. Make these security-enhancing changes:

PermitRootLogin no

Protocol 2

AllowUsers sec406 lab

PasswordAuthentication no

ClientAliveInterval 300

ClientAliveCountMax 3

Port 2222

3. After making changes, restart the SSH service:

$ sudo systemctl restart ssh

4. If you changed the port, update your firewall:

$ sudo ufw allow 2222/tcp

$ sudo ufw delete allow 22/tcp

#### Setting Up SSH Key Authentication

Key-based authentication is much more secure than password only authentication. Here's how to set it up:

1. On your local machine, generate an SSH key pair:

$ ssh-keygen -t ed25519 -C "sec406@sans.org.local"

Follow the prompts and set a passphrase for additional security.

2. Copy the public key to your SSH server:

$ ssh-copy-id sec406@ssh-server

3. Now you can log in without a password. If you are prompted for a password, it is most likely the password placed on the SSH key itself and not password authentication to the target SSH server.

$ ssh sec406@ssh-server

4. Disable password authentication in the SSH config only AFTER key-based authentication is working, as shown above.

Monitoring Network Activity

Monitoring your network activity helps identify unusual behavior that might indicate a security issue.

#### Network Connection Monitoring

We've already seen `ss` for listing open ports. To monitor active connections:

$ ss -tanp

State   Recv-Q  Send-Q     Local Address:Port     Peer Address:Port  Process

LISTEN  0       128        0.0.0.0:22             0.0.0.0:*          users:(("sshd",pid=950,fd=3))

LISTEN  0       128        127.0.0.1:631          0.0.0.0:*          users:(("cupsd",pid=696,fd=7))

ESTAB   0       0          192.168.1.100:22       192.168.1.5:49232  users:(("sshd",pid=2490,fd=4))

This shows established connections (ESTAB), their local and remote addresses, and the processes using them.

#### Using tcpdump for Packet Capture

For more detailed network monitoring, `tcpdump` allows you to perform full network packet captures and analyze network traffic:

$ sudo apt install tcpdump# Install if needed

$ sudo tcpdump -i eth0 -n tcp port 80

This captures TCP port 80 HTTP traffic on the eth0 interface. The `-n` option prevents DNS resolution, which speeds up the display.

For a more user-friendly view, try `wireshark`, a graphical packet analysis tool:

$ sudo apt install wireshark

$ sudo wireshark

#### Network Bandwidth Monitoring

To monitor real-time bandwidth usage by connection, try `iftop`. Press 'h' for help or 'q' to quit.

$ sudo apt install iftop

$ sudo iftop -i eth0

To show bandwidth usage grouped by process:

$ sudo apt install nethogs

$ sudo nethogs

Securing Network Services

Beyond SSH, you might run other network services that need protection.

#### Web Servers (Apache/Nginx)

If you're running a web server:

1. Keep it updated:

$ sudo apt update && sudo apt upgrade

2. Remove unnecessary modules from Apache with the `a2dismod` tool. For example:

$ sudo a2dismod status autoindex

$ sudo systemctl restart apache2

3. Use HTTPS with a free Let's Encrypt certificate:

$ sudo apt install certbot python3-certbot-apache

$ sudo certbot --apache

4. Set secure headers in your configuration.

#### Database Servers

For database servers like MySQL/MariaDB:

1. Ensure they only listen on localhost if external access is not necessary:

bind-address = 127.0.0.1

2. Use strong passwords and limit database user privileges:

$ sudo mysql_secure_installation

$ sudo mariadb-secure-installation

3. Consider using a firewall to restrict access to database ports (3306 for MySQL):

$ sudo ufw allow from 192.168.1.5 to any port 3306

Network Threat Detection

Simple tools can help detect potential network-based threats.

#### Using fail2ban to Block Brute Force Attacks

`fail2ban` monitors log files and temporarily bans IP addresses showing malicious activity:

$ sudo apt install fail2ban

Create a basic configuration file:

$ sudo nano /etc/fail2ban/jail.local

Add this content for SSH protection:

[sshd]

enabled = true

port = ssh

filter = sshd

logpath = /var/log/auth.log

maxretry = 5

bantime = 3600

Restart the service:

$ sudo systemctl restart fail2ban

Now, any IP address that fails SSH authentication five times within the monitoring period will be banned for an hour. This is called a speed bump lockout and is a great protection to slow down automated attacker tools.

################## REPLACE WITH LYNIS? #########################

#### Using rkhunter for Rootkit Detection

Rootkits often establish network connections to command and control (C2) servers:

$ sudo apt install rkhunter

$ sudo rkhunter --update

$ sudo rkhunter --check

Review the results for suspicious network activity.

Securing DNS Settings

Domain Name System (DNS) translates domain names to IP addresses. Secure DNS settings can prevent various attacks:

1. Check your current DNS settings:

$ cat /etc/resolv.conf

2. Consider using secure DNS providers like Quad9 (9.9.9.9) or Cloudflare (1.1.1.1):

$ sudo nano /etc/resolv.conf

Add these lines:

nameserver 1.1.1.1

nameserver 1.0.0.1

For a more permanent solution, configure your network manager or DHCP client.

3. To verify DNS is working and secure:

$ dig +short @ns1-1.akamaitech.net whoami.akamai.net

This should return your public IP address.

Network Encryption with VPNs

A Virtual Private Network (VPN) encrypts your internet connection for better privacy and security, especially on public networks.

#### Using OpenVPN

1. Install the free OpenVPN client:

$ sudo apt install openvpn

2. Connect using a configuration file from your VPN provider:

$ sudo openvpn --config ~/openvpn-configuration-file.ovpn

#### Using WireGuard (a newer, simpler VPN)

1. Install WireGuard:

$ sudo apt install wireguard

2. Create a basic configuration:

$ sudo nano /etc/wireguard/wg0.conf

Add configuration details provided by your Wireguard VPN service.

3. Start the connection:

$ sudo wg-quick up wg0

4. Make it start automatically at boot:

$ sudo systemctl enable wg-quick@wg0

Network Hardening Checklist

Here's a checklist to secure your Linux system's network connections:

1. Know your network interfaces and open ports:

$ ip addr show

$ sudo ss -tulpn

2. Set up a basic firewall:

$ sudo ufw allow ssh

$ sudo ufw enable

3. Secure SSH:

  • - Disable root login
  • - Use key-based authentication
  • - Change default port (optional)

4. Keep all network services updated:

$ sudo apt update && sudo apt upgrade

5. Disable or secure unnecessary services:

$ sudo systemctl disable <service_name> --now

$ sudo systemctl mask <service_name>

6. Monitor network traffic for unusual activity:

$ sudo tcpdump -i eth0 -n

7. Implement fail2ban to prevent brute force attacks:

$ sudo apt install fail2ban

8. Use secure DNS providers:

nameserver 1.1.1.1

nameserver 9.9.9.9

9. Consider using a VPN on public networks:

$ sudo apt install openvpn

10. Regularly check for unauthorized users logged in over the network:

$ last

$ who

Practical Exercise: Basic Network Security Setup

Let's combine what we've learned into a practical exercise to secure your system's network:

1. Check your current network status:

$ ip addr show

$ sudo ss -tulpn

2. Install and configure a basic firewall:

$ sudo apt install ufw

$ sudo ufw allow ssh

$ sudo ufw enable

$ sudo ufw status

3. Secure SSH (if you're using it):

$ sudo cp /etc/ssh/sshd_config /etc/ssh/sshd_config.bak

$ sudo nano /etc/ssh/sshd_config

Make these changes:

PermitRootLogin no

PasswordAuthentication no  # Only if you've set up key authentication

Restart SSH:

$ sudo systemctl restart ssh

4. Install and set up fail2ban:

$ sudo apt install fail2ban

$ sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local

$ sudo nano /etc/fail2ban/jail.local

Enable the SSH jail and restart:

$ sudo systemctl restart fail2ban

5. Check for unnecessary network services:

$ sudo systemctl list-units --type=service --state=running

Disable any services you don't need:

$ sudo systemctl disable --now <service_name>

6. Verify your DNS settings:

$ cat /etc/resolv.conf

Set secure DNS providers if needed.

7. Test your security:

$ sudo apt install nmap

$ sudo nmap -sT -O localhost

Check that only the necessary ports are open.

Understanding Wireless Network Security

If your Linux system uses wireless networking, additional security measures are needed:

1. Check your wireless interface:

$ iwconfig

2. Scan for available networks:

$ sudo iwlist wlan0 scan | grep ESSID

3. Connect to WPA2/WPA3 networks only (avoid WEP):

$ sudo nano /etc/netplan/01-network-manager-all.yaml

Configure with strong credentials.

4. Disable wireless when not needed:

$ sudo ip link set wlan0 down

Network Access Control with iptables

While `ufw` is simpler, understanding basic `iptables` commands gives you more control:

$ sudo iptables -L

$ sudo iptables -A INPUT -s 192.168.1.10 -j DROP

$ sudo iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

$ sudo iptables-save > /etc/iptables/rules.v4

For more complex scenarios, consider learning more about `iptables` or its newer replacement, `nftables`.

Conclusion: Building Your Network Defense

Network security is a critical aspect of overall Linux security. By understanding your network connections, implementing a firewall, securing services, and monitoring for unusual activity, you've significantly improved your system's defense against network-based attacks.

Remember that network security is an ongoing process, not a one-time setup. Regular monitoring and updates are essential to maintaining your security posture.

Practice Questions

To reinforce your learning, try answering these questions:

1. What command shows which network ports are listening?

2. How do you allow SSH connections from 192.168.1.5 only?

3. Why is HHS key-based authentication more secure than password authentication?

4. What tool helps block IP addresses that show suspicious behavior, like multiple failed login attempts?

5. What protects your data on public Wi-Fi?

Want to know more? Check out the course preview of SEC406: Linux Security for InfoSec Professionals for a free hour of course content. Ready to take your Linux skills to the next level? For a limited time, take the SEC406 course for just $5,250!

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cyber Defense

Related Content

Blog
CD - Blog - Making Linux Security Accessible Blog Series - Part 4_340 x 340.jpg
Cyber Defense
April 7, 2025
Process Management: Knowing What is Running on Your System – Part 4 of 5 of the Terminal Techniques for You (TTY): Making Linux Security Accessible Blog Series
Welcome to the fourth installment in our TTY series! So far, we've explored how to navigate the Linux file system, keep your software updated, and control file permissions. In this post, we're going to discover another critical aspect of Linux security: understanding and managing the processes...
CharlieGoldner_370x370.png
Charles Goldner
read more
Blog
powershell_option_340x340.jpg
Offensive Operations, Pen Testing, and Red Teaming, Penetration Testing and Red Teaming, Cybersecurity and IT Essentials, Cyber Defense
July 27, 2022
Month of PowerShell: Fileless Malware with Get-Clipboard
Let's take a look at a sneaky attack to use PowerShell maliciously while evading detection (and some ways to detect it).
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
Blog
powershell_option_340x340.jpg
Cyber Defense, Cybersecurity and IT Essentials
July 19, 2022
Month of PowerShell: Solving Problems (DeepBlueCLI, Syslog, and JSON)
Let's look at an example of problem solving using PowerShell with DeepBlueCLI, Syslog, and JSON data.
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn