Virtual Firepower (FTDv) automation deployment

While for long time firewall has typically been something associated with large metal appliances sitting on the outskirts of an infrastructure. More and more are looking into virtualizing also this part of their infrastructure. The…


Installing ISE 2.4 in the Homelab

No Homelab is complete without a state-of-the-art Identity and Policy Engine. Of course there is an official install guide available here which is written for supported Environment ect., but there are always us, the odd few…



Extending the life of your Firepower Lab Enviroment

Updated: Word has it that the procedure described herein has be deprecaded in later releases (see comment below) When working with lab environments it is often an issue obtaining the proper licenses for the devices….


Palo Alto Networks Traps 4.1 – Cryptolocker Module

The Advanced Endpoint Protection (aka. Traps, aka. Cyvera) from Palo Alto Networks have added a seperate ‘Cryptolocker module’ to its range of detection methods. In this post I will go over this particular module. Setting…


Phishing Demonstration Setup with Kali

The post contains a crude example on how to easily clone an existing site for use in a phishing campaign. It is based on rudimentary techniques as it is only meant as a proof-of-concept demonstration…