CLI
WMI 101 for Pentesters
PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool
If your current capture process can’t keep up with the traffic and drops packets – you need a new capture process. No debates here. Analyzing a trace file in which you don’t ...
Username? That’ll Be RM – RF /
If Sean Gallagher's screed detailing an ICS/SCADA hardware flaw, at our go-to site of popular intelligence - Ars Technica) wasn't brimmed-up full of schadenfreude, I'd be crying in outrage (specifically, at the ...
Troubleshooting Dynamic Updates on Palo Alto Firewalls
The following are troubleshooting steps to take when installing a Palo Alto Firewall in Virtual Wire mode or doing an initial configuration behind the existing firewalls and the dynamic updates for Threat ...
Creating Palo Alto Reports at the Command Line
I have been working on creating reports on Palo Alto Firewalls from the command line. For this scenario I have created two security policy rules for inbound and outbound. Now we want ...