In previous articles I shared on breaking and remediating vulnerable systems and also discussed on perculiar flaws of network applications. Now, I will like to write a series of articles on monitoring and defending one’s personal machine. The audience for this series are technical users, a non-technical user could also learn from it.
A typical developer executes programs and scripts they entirely do not understand what it actually does. And worse the machines they work with are not properly locked down, they are either installed with binaries developers do not need or have frivolous ports open. I will take the effective and efficient engineer through a series of articles on guarding the perimeter of their castle - Network - and recording every anomalous activities undertaken in the castle - Host.
Clone the NHIDPS repository and change into the directory. Install all requisite software and run commands specified in the README.
|
|
Below are some screenshot of the Debian OS installation process you would encounter:
You can now log into the machine with your specified credentials. Note however that packer is still building the image. Do not shutdown the system until the terminal from where you ran the packer show the message
|
|
Let’s now bring up the machine by running the vagrant command
|
|