September 24, 2023

Ansible is distributed as a Python module installable via PIP. The installation process is straightforward but warrants some considerations. Typically, the automation host, the system from which all automation scripts originate, is one of the most critical systems within an infrastructure.

Post cover
September 21, 2023

The first step to work in the IT field today is to set up a laboratory. EVE-NG (formerly UNetLab) can be used for network, network security, and automation labs. EVE-NG is based on Ubuntu Linux 20.

Post cover
September 16, 2023

This post recounts an attempt at fraud via SMS and voice call with a fake voice, targeting an elderly person. Although this type of fraud is not new, the way it was executed deserves further examination.

Post cover
August 12, 2023

Operating on a data center (DC) or backbone Internet Service Provider (ISP) typically involves a significant amount of human effort, resulting in operational costs that are often overlooked. However, these costs can be optimized by harnessing the power of automation to handle simple and repetitive tasks efficiently.

Post cover
March 02, 2023

I used to deploy a simple network architecture for two main reasons. They are easy to debug/troubleshoot Engineers who came after can easily understand and manage them. With these rules in mind, I usually deploy in-line firewalls, meaning that traffic is routed through a firewall that is placed “in the path”:

Post cover
October 31, 2022

This is the third part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here is the first and second parts. A few weeks ago I met Spacelift and I had the chance to test their product.

Post cover
October 30, 2022

This is the second part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here are the first and third parts. In a pure design perspective, the client-to-site VPN approach is still the best.

Post cover
October 29, 2022

This is the first part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here are the second and third parts. During my Twitch session, I’m used to offering a practical lab to attendees.

Post cover
September 22, 2022

During the last “Blue Vs Red” events, together with Rocco Sicilia , we discussed how to attack and defend a simple, all-in-one, WordPress site. This post serves as a memorandum to remember all topics we discussed and how we reacted to specific attacks.

Post cover
August 28, 2022

Years ago I worked on a data center migration project. I was in charge to review network documentation, and automating the configuration, testing, and migration phases. There is no chance to review dozens of switches manually, so I wrote some Python scripts to get neighborship and configuration from switches, drawing Visio diagrams.

Post cover