Skip to content

Instantly share code, notes, and snippets.

@githubfoam
githubfoam / IIS cheat sheet
Last active September 19, 2023 07:39
IIS cheat sheet
==========================================================================================================
reset IIS without having to reboot the whole server
iisreset
==========================================================================================================
To check if IIS (Internet Information Services) is running on a Windows Server 2019 Standard server, you can use several methods, including the graphical user interface (GUI) and command-line tools. Here are two common methods:
Method 1: Using the GUI (Server Manager)
Log In: Log in to the Windows Server 2019 Standard using an account with administrative privileges.
@githubfoam
githubfoam / ansible networking cheat sheet
Last active May 20, 2025 06:21
ansible networking cheat sheet
--------------------------------------------------------------------------------------------------------------------
This error occurs because the SSH server (your Cisco switch) only supports weak key exchange algorithms, such as diffie-hellman-group1-sha1, which are disabled by default in modern OpenSSH clients for security reasons.
Solution: Enable Legacy Key Exchange Algorithm in SSH
You can override the default SSH settings and explicitly allow diffie-hellman-group1-sha1 by adding the -o KexAlgorithms=+diffie-hellman-group1-sha1 option.
🔹 Updated sshpass Command
while read switch; do
sshpass -p 'yourpassword' ssh -o KexAlgorithms=+diffie-hellman-group1-sha1 -o StrictHostKeyChecking=no admin@$switch exit
done < switches.txt
@githubfoam
githubfoam / windows 11 cheat sheet
Last active May 8, 2025 06:23
windows 11 cheat sheet
#=====================================================================
solution A generated by ms copilot
solution B generated by deepseek
According to this requirement, compare these two solutions; solution A and Solution B; advise
This is requirement
On Windows 1o, there are two folders with several folders and files, and these folders also have files and folders with an unspecified depth. Folder A has 5486 files,789 folders; folder B has 4689 files, 713 folders. You want to merge folder A and Folder B without duplicating folders and files into folder C. Explain how to do this
@githubfoam
githubfoam / dell switch S404 8cheat sheet
Last active March 12, 2025 07:49
dell switch S4048 cheat sheet
#=====================================================================
https://ansible-dellos-docs.readthedocs.io/en/latest/index.html
#=====================================================================
The dellemc.os9 collection supports Enable Mode (Privilege Escalation). This page offers details on how to use Enable Mode on OS9 in Ansible
https://docs.ansible.com/ansible/latest/network/user_guide/platform_dellos9.html
#=====================================================================
This collection includes the Ansible modules, plugins and roles needed to provision and manage Dell EMC PowerSwitch platforms running Dell EMC OS9. Sample playbooks and documentation are also included to show how the collection can be used.
https://github.com/ansible-collections/dellemc.os9/tree/main
#=====================================================================
@githubfoam
githubfoam / fortigate - HA mode cheat sheet
Last active January 23, 2025 01:23
fortigate - HA mode cheat sheet
#=====================================================================
#how to power off fortigate cluster
#unplug the power cables as there is no power buttons
shut down first the secondary(backup unit)
Unit-1 # execute ha manage 1 {To switch to the backup unit}
Unit-2 $ {Now on the backup unit}
Unit-2 $ execute shutdown {To shut down the backup unit}
This operation will shutdown the system !
Do you want to continue? (y/n)y
@githubfoam
githubfoam / ubuntu forensics cheat sheet
Last active June 2, 2025 11:45
ubuntu forensics cheat sheet
============================================================================
FOR577: LINUX Incident Response and Threat Hunting
https://www.sans.org/cyber-security-courses/linux-threat-hunting-incident-response/
============================================================================
#ChatGPT
Determining the precise date and time when ClamAV was installed on an Ubuntu Linux system might require a bit of sleuthing, as Linux doesn't typically log installation timestamps by default. However, you can use system logs and package manager records to get an idea of when ClamAV was installed:
Method 1: Checking Package Installation Logs
APT Logs:
@githubfoam
githubfoam / Investigation Path - command and control (C2 or C&C)
Last active July 20, 2023 19:08
Investigation Path - command and control (C2 or C&C)
==========================================================================================================
#https://attack.mitre.org/tactics/TA0011/
Tactics/Techniques
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses
==========================================================================================================
#ChatGPT
As an incident response security engineer detecting a command and control (C2/C&C) attack on a host, you can use the MITRE ATT&CK Navigator as a helpful tool to aid in your incident response efforts. The MITRE ATT&CK Navigator is a web-based tool that allows you to visualize and track adversary techniques, tactics, and procedures in real-time. Here's how you
@githubfoam
githubfoam / threat hunting cheat sheet
Last active December 22, 2023 23:20
threat hunting cheat sheet
#===================================================================================================================================
#ChatGPT
To schedule a PowerShell script to run at regular intervals in Windows, you can use the schtasks command. The schtasks command allows you to create, modify, delete, or view scheduled tasks on the local or remote computer. Here's how you can use it to schedule a PowerShell script:
Example: Schedule PowerShell Script to Run Daily
Let's say you have a PowerShell script named MyScript.ps1 located in C:\Scripts that you want to run daily at 10:00 AM. Here's how you can schedule it using schtasks:
Open Command Prompt or PowerShell as an administrator.
@githubfoam
githubfoam / cloud security cheat sheet
Created July 6, 2023 06:08
cloud security cheat sheet
==========================================================================================================
#Bing
The Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) program is a publicly accessible registry that documents the security and privacy controls provided by popular cloud computing offerings. STAR encompasses the key principles of transparency, rigorous auditing, and harmonization of standards outlined in the Cloud Controls Matrix (CCM)1. By obtaining the CSA STAR Certification, Cloud Service Providers (CSPs) show to their clients that they are using best practices to protect data in cloud applications2. The CSA STAR Certification is a rigorous third-party independent assessment of the security of a cloud service provider. This technology-neutral certification leverages the requirements of the ISO/IEC 27001:2013 management system standard together with the CSA Cloud Controls Matrix3.
=============================================================================================
@githubfoam
githubfoam / Incident response cheat sheet
Last active April 20, 2025 07:39
Incident response cheat sheet
----------------------------------------------------------------------------------------------------
SIEM stands for Security Information and Event Management. Essentially, it's a software platform that aggregates data from various security sources across your IT infrastructure, analyzes it in real-time, and helps you detect and respond to potential security threats.
Think of it as a security command center:
Gathers information: Collects logs, alerts, and events from firewalls, intrusion detection systems, antivirus software, and other security tools.
Correlates data: Analyzes the collected information to identify patterns, anomalies, and potential threats.
Alerts and reports: Notifies security teams about potential incidents and provides reports for investigation and analysis.
Streamlines response: Helps automate incident response tasks and provides tools for investigation and mitigation.
Benefits of SIEM: