877.791.9571 |

About the Author:

Dejan Lukan is a security researcher for InfoSec Institute and penetration tester from Slovenia. He is very interested in finding new bugs in real world software products with source code analysis, fuzzing and reverse engineering. He also has a great passion for developing his own simple scripts for security related problems and learning about new hacking techniques. He knows a great deal about programming languages, as he can write in couple of dozen of them. His passion is also Antivirus bypassing techniques, malware research and operating systems, mainly Linux, Windows and BSD. He also has his own blog available here: http://www.proteansec.com/.

Cloud VPN Security Recommendations

A VPN (Virtual Private Network) enables connections between clients and servers from multiple different internal networks across a public network (like the Internet) as if the nodes were located […]


Maximizing SSH Security Service in the Cloud

SSH service running on port 22 is one of the most widely used services on the Internet. There are numerous reasons for its widespread use, among which is direct […]


Protecting WordPress Installations in an IaaS Environment

In this article we’re going to take a look at how to secure a WordPress installation against attackers in an IaaS virtual machine. Virtual machines can be rented with […]


Top Cloud Computing Threats in Enterprise Environments

The cloud has been around for some time now and is still gaining popularity in every day operations of IT companies. I’ve seen different companies with operational models 90% […]


Data Backups with Bacula: Mobile Devices

Bacula was specifically designed for backup jobs in a server environment, where servers have IP addresses that don’t change regularly and are always up and running. Mobile devices usually […]


Data Backups with Bacula: Notifications

When the backup solution is already working, we can also take a look at notifications more closely. We can send a notification email for every backup, which is run […]


Data Backups with Bacula: Backup Encryption

Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage. Since the file daemon encrypts the data prior to sending it […]


Data Backups with Bacula: Client Data Backup and Restoration


When configuring the Bacula client, we don’t need the full-blown Bacula installation, but just the bacula-client package that we can simply install by using the apt-get command. The client […]


Data Backups with Bacula: Bacula Internals

This article presents the integral concepts of Bacula operation and management, which are integral parts of every Bacula backup solution and must be understood in detail. When using Bacula, […]


Data Backups with Bacula: Creating the Storage Partition

In this endeavor I’ve chosen to use Bacula backup software for the reasons outlined above. First we must talk about the Bacula server, but the outlined concept refers to […]


Secure Backup Concepts in a Private Cloud

1. IntroductionCreating a backup procedure is a very important aspect for a company, because a loss of data can result in great damage to the company, possibly even a […]



Downloading Xplico
In this article we’ll present Xplico, which is a network forensics tool installed in major digital forensics Linux distributions like Kali, Backtrack, Security Onion, DEFT, etc. In this […]


Shellcode Detection and Emulation with Libemu

Libemu is a library which can be used for x86 emulation and shellcode detection. Libemu can be used in IDS/IPS/Honeypot systems for emulating the x86 shellcode, which can be […]


iSCSI Security Considerations in the Cloud

Introduction to SCSI
The SCSI (Small Computer System Interface) defines a way to exchange data between a computer and its peripheral devices, like a hard drive, a tape drive, a […]


Pafish (Paranoid Fish)


In this tutorial we’ll take a look at a Pafish tool, which performs anti debugger/vm/sandbox tricks to detect whether the malware is being executed in a debugger, in a […]


Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol


In this tutorial, we’ll take a look at how we can hack clients in local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automatic discovery of […]


Domain Generation Algorithm (DGA)


We all know there have been (and still is) a lot of malware lurking around the Internet. It’s quite usual today that once the victims get infected, they call […]


Obtaining Information from Dumping Memory


In this article, I’ll present whether it’s possible to get access to passwords lying around in memory by using a fully patched Linux x64 operating system. First, it’s not […]


Virtual DMZs in the Cloud


DMZ or DeMilitarized Zone is primarily used to separate the network into multiple blocks to enhance security. The name is derived from the same term used to define an […]


Building a Secure API in a Cloud Environment


In the last couple of years there has been a boom in cloud computing, but mainly just the term is new, as we’ve been using cloud services for years […]