Posts

Fail2ban Behind Reverse Proxy

Image
Assumptions, Prerequisites, Prior Set Up This guide is for when the reverse proxy & FoundryVTT server are both on separate machines This guide builds upon the prior one and details how to setup fail2ban to block bad bots, automated login attempts, and repeated connection attempts that are likely malicious, when your server is behind a reverse proxy.  If you haven't taken a look already my prior post detailed how to go about setting up fail2ban rules. https://blog.iterlyze.com/2024/11/fail2ban-foundryvtt.html  This guide assumes you are using a Debian 12 server (or Ubuntu) and have a basic idea of how to use a Linux shell. Some other assumptions that won't affect setting up fail2ban include that you are using Nginx as the reverse proxy, nftables as your system's firewall frontend, and that you are forwarding traffic to a FoundryVTT server. Make sure the reverse proxy and the server it sends traffic to is working before trying to set up fail2ban. If you are setting up Fou...

Fail2ban Rules for Foundry VTT

Image
Leave a comment if you like, hate, or find something confusing. This guide covers the steps required to create your own fail2ban jails, using foundryvtt as an example. *Warning I take some playful liberty at the start of this post. Welcome fellow nerds, geeks, otaku, or whatever you smartypants call yourselves. I'm assuming you might fit one of the following categories probably because you either know what Fail2ban is you nerd, or you know what FoundryVTT is you DnD tabletop (but on computer) roleplaying geek . Now that i've gotten the tongue in cheek (insults/compliments) aside I have a confession to make. I know what both of those things are so does that make me like a Generked? Okay I just mixed the two words together, that might be good for a riddle or puzzle in some future game. Anyways enough blabbing, you are probably here for the technical content anyways. Everything that i'm writing is assuming you use an Ubuntu/Debian based Linux distribution. Most Linux distros ...

Bootloader Fails to Install?

Sometimes there are good old things that we just can't get away from. Something about the continued functionality inspite of the "newer better" hype cycles in technology. I digress though, so onto the meat of this post. There is an issue that has plagued an old laptop of mine for a while. It happened when I would change the HardDrive in the machine. (Think cycling through Windows 7, 8, 10, Ubuntu, Fedora, Debian, etc) Each time the HD was switched up the bootloader would cease to work. Worse yet a fresh install wouldn't work. DunDunDun! Hardware Issues! Turns out the nvram was having issues. Luckily Linux has this handy command line tool efibootmgr  to save the day. Grab a Live Cd/USB and Extra entries can be deleted by command like    sudo efibootmgr -b entry_in_nvram -B    . You might also want to remove excessive dump files using a command such as    sudo rm /sys/firmware/efi/efivars/dump-*   If needed check your OS for how to regenerate y...

Leadership Training 2

Image
Recently I was invited to conduct a leadership workshop at California State University of Monterey Bay for the Networking and Security Team. They wanted the training to focus in on getting things done, so I put together a few fun training activities that help with communication, self-direction, teamwork, and having more effective meetings. Activities build leaders faster than lectures in my experience. Check out the slides and try a few of the activities for yourself! When talking about leadership a general discussion about what a leader is, is in order. When asked many of the participants shared ideas such as "A leader is someone who gets things done", "Someone who steps up", "An active listener", "Leaders are people that others follow". We didn't get too deep into what a leader was in this training and focused more on a few of the skills. If you are interested in diving a little deeper into some of the details of leadership i've foun...

What is a VPN

Image
Here is a quick presentation about VPN's

Leadership Training 1

Image
I recently put on a leadership workshop. There are multiple styles of and theories of leadership, but here are a few that i've found useful. The better part of this workshop though were the activities that followed it. You see training people to be leaders isn't as straight forward a task like training a manager might be, so rather than just lecturing all day the real goal was to have a series of activities that help develop leadership skill by doing them. It also helps that it's fun to do it this way! The slides have more than the video It's interesting that my post on Leadership Training seems to consistently get views vs this one on Leadership Development. I'm guessing it's because of the topic title & the fact that i've written a description. (So let's update this post and see what happens). Might as well add my Officer Management slides developed for the Network Security Team (Club at CSUMB) after this. All three of the presentations have rel...

Password Cracking

Image
Hi there. I've put together a presentation on password cracking with Hashcat. Fair warning I made a small mistake in one of the slides where I switched the labels for the dictionary and the file containing the password hashes. The video is pretty comprehensive and should be enough information to compete in the National Cyber League password category.