Categories
AWS Linux Networking

Hacking your way around AWS IAM Role for your Laptop

Identity and Access Management (IAM) offers role-based accessed control (RBAC) to your AWS account users and resources, you can granularize the permission set by defining policy. If you are familiar or even a beginner with AWS cloud, you know that how important IAM is. AWS Identity and Access Management (IAM) is a web service that […]

Categories
security Sysadmin

Knock Knock … literally this time 😉 – Port Knocking

Hello folks, It’s been a long time since I wrote my last blog. In this blog post, I will show you how you do port knocking to access services on servers such as ssh, mail (postfix), etc securely. Well, we will be literally knocking on ports from the client-side this time 😉 What is port […]