Why Business Owners Need Strong Passwords and Two-Factor Authentication (2FA)

In today’s increasingly digital world, cyber security has become an essential component of business operations. Many business owners and stakeholders may assume that cyber threats only affect large corporations or high-profile companies. However, small and medium-sized businesses are often even more vulnerable, as cyber criminals know they may lack robust security measures. Implementing strong passwords and two-factor authentication (2FA) is a straightforward yet crucial step that can help protect business assets and maintain trust with clients and partners. Here’s why these practices should be a priority for every business owner.

Continue reading “Why Business Owners Need Strong Passwords and Two-Factor Authentication (2FA)”

Creating Strong Passwords: Best Practices and Secure Storage

In today’s digital age, the importance of strong passwords cannot be overstated. With cyber threats on the rise, safeguarding your online accounts with robust passwords is essential. This article delves into the best practices for creating strong passwords and explores how to use and store them securely using various consumer password managers.

Continue reading “Creating Strong Passwords: Best Practices and Secure Storage”

Import Passwords From KDBX Or CSV Files Into Passbolt

In today’s dynamic business environment, effective password management is crucial to ensure the security of sensitive information. Passbolt, an open-source password manager, provides a robust solution for organizations looking to enhance their credential management practices. We’ll explore the process of importing KDBX and CSV files into Passbolt, helping the transition to a more secure and efficient password management system.

Continue reading “Import Passwords From KDBX Or CSV Files Into Passbolt”

Install Passbolt Self-Hosted With Podman

Passbolt is an open-source password manager designed for teams and organizations that prioritize security and privacy. It offers the following features:

  • Security-First Approach: Passbolt puts security first, with a security model that supports user-owned secret keys and end-to-end encryption, regularly assessed by top penetration testers.
  • Built for Collaboration: It allows secure sharing of credentials with powerful auditing tools and unparalleled granularity for access controls and encrypted data.
  • Privacy Focus: Headquartered in the EU, Passbolt prioritizes privacy and is designed to comply with European privacy laws.
  • Versatility and Control: Passbolt is designed to put users in control of their data and protect them from a wide range of potential threats, making it suitable for security-conscious organizations.

Passbolt is trusted by a wide range of organizations, including Fortune 500 companies, the defense industry, universities, and startups, and has received 4,000 stars on GitHub as a seal of approval for its reliable and secure password management. It is also available as a free and open-source solution, with an extensible API for developers.

Continue reading “Install Passbolt Self-Hosted With Podman”

Keep Our Secrets in a Safe Place: ProtonPass Password Manager Review

We all have secrets. Whether it’s our bank account details, our social media passwords, or our personal information, we don’t want anyone to access them without our permission. But how do we keep our secrets safe in the digital age, where hackers, phishing scams, and data breaches are frequent?

Continue reading “Keep Our Secrets in a Safe Place: ProtonPass Password Manager Review”

How to install Hashicorp Vault on Debian

Hashicorp Vault is a popular tool for managing secrets and encryption in cloud environments. It allows us to store, access, and distribute sensitive data securely across different applications and platforms. In this blog post, I will show us how to install Hashicorp Vault on Debian 11 (Bullseye), the latest stable release of the Debian operating system.

Continue reading “How to install Hashicorp Vault on Debian”

How to crack passwords with John the Ripper? Password hacking in real practice as an Ethical Hacker!

In the first part of this series we found out a user’s password with Hydra with simply attacking his account via SSH. It is a so called “dictionary attack”, and because of the lack of security measurements we could get into the remote system.

In this exercise we continue our Ethical Hacking journey and we will find a way to get root privileges on the remote machine. This is called privilege escalation.

Important note: cracking passwords in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to crack passwords with John the Ripper? Password hacking in real practice as an Ethical Hacker!”

How to brute force and crack SSH passwords with Hydra? Ethical Hacking in real practice!

In this presentation we will crack the password of a general Linux user via SSH in our personal lab. The machine from which we start the attack is a Kali Linux box, and the attacked machine is an ordinary Debian Linux on which a user set a weak password. Unfortunately the security settings are weak on the target host, so we have a great chance for success. We already know the name of the user.

Important note: cracking passwords in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to brute force and crack SSH passwords with Hydra? Ethical Hacking in real practice!”

Password Manager upgrade: I switched to KeepassXC

I’ve been using the Keepass password vault for years. I don’t remember when I started to keep my secrets in it, but it can be easily a decade ago. Though I always liked Keepass, and its features are strong, times have changed and I looked for something fresher and more elegant. My choice is KeepassXC. Read more to see why!

Continue reading “Password Manager upgrade: I switched to KeepassXC”

Password Manager 101

In 2022 there is no excuse to do not use a reliable password manager. Period!

In the age of passwordless authentication, IoT, smart devices and high speed internet connection data breaches are more common than usual, mostly because of the insecure password usage. Remembering long and difficult passwords is really counter productive but luckily there is the solution: password managers! The era of post-its attached to the display with corporate or private secrets must be over. Even the corporate security starts with the individual level safety. Today’s cyber world demands strong and thorough security considerations even in our personal lives. We have bank account credentials, paid subscriptions and other stored card informations on different websites and mobile devices. So, do YOU use weak or shared passwords? Do you have any default passwords in your devices? Think about it a bit!

Continue reading “Password Manager 101”