Ansible x Fortigate : Script collection

After the previous article : Ansible : Automated Fortigate blocklist ipsets, I’dl ike to share with you a small script collection I use to be sure I’ve the exact same configuration on all my fortigates firewall. Wrote with Ansible. I automatise some important configuration like system configuration, LDAP & admin …

Read More »

Ansible : Automated Fortigate blocklist ipsets


With current events, I decided to write a small Ansible / Python script to feed our firewalls with known malicious IPs. I share this script with you through Github ;). I’m using python to format the csv then I use in Ansible to parse the data into the Fortigate firewall. …

Read More »

S2S VPN Between Meraki MX / Z & Forcepoint NGFW

Site to site VPN

Just a small blog post to share with you, how to set up a S2S VPN between Meraki MX or Meraki Z device & Forcepoint NGFW, I worked on this topic, and there is some things to know :). Forcepoint VPN Profile The most important setting is the IKE. I …

Read More »

Forcepoint NGFW Massive licences import to SMC with API

The Forcepoint licensing process is heavy and not optimized … You’ve to go to the support site to recover your POS or POL number, then go to the licensing website, to register the device and download a JAR file, then you’ve to upload it on your SMC … Luckily, the …

Read More »

Forcepoint : Deploy the SMC on AWS | Part II

In the first Howto Forcepoint : Deploy the SMC on AWS | Part I, we implement all prerequisitesIn the second part, we install all the components needed : the SMC & the Log Server, After what, we’ll do the configuration, in the third blog post. 2 / Installation We now …

Read More »

Forcepoint : Deploy the SMC on AWS | Part I

How to deploy Forcepoint SMC (Security Management Center) on AWS ? This is a good question. You’ve some document on forcepoint website, but it only explain how to install the SMC. In this howto, you’ll learn how to deploy a SMC behind a Forcepoint Firewall on a new AWS environnement.From …

Read More »

Investigate if your linux server has been hacked or not

We’re a lot to face intrusion attemps in our IS. There can be many interests for attackers, for example data theft, using your computing power … Most of the Hackers takes precaution while performing illegal activities and always try to hide themselves from being caught. Once the system is compromised …

Read More »

Hash Cracking with AWS EC2 P3 & Hashcat

Password cracking is a mandatory activity when you perform a pentest. Having access to a GPU cracking machine would be nice from time to time however and the GPU systems that Amazon EC2 supports offers a decent compromise. In this howto, I’ll share with you a script that let you install …

Read More »

Introduction to Forcepoint API & SMC-Python

A quick introduction to Forcepoint API, with the SMC-Python which is a Python based library to provide the ability to interact with the Forcepoint NGFW Management Center API. Provides automation capabilities for any environment that interact with the SMC remotely. 1 / Prerequisites Install the python package after having installed …

Read More »

Sync Keepass to Google Drive with KeePassSyncForDrive

Keepass 2.46

KeePass Password Safe is a free and open-source password manager. I already wrotte a blog post 7 years ago about how to sync keepass to Google Drive. The howto is out of date, so I propose a new one :). This time, We’ll use the plugin KeePassSyncForDrive 1 / Plugin …

Read More »

Install Elastic Stack 7.x on CentOS 7 with SSL, TLS & HTTPS

Elasticsearch logo

This tutorial discusses how to install ElasticSearch 7.10 on CentOS 7. Elasticsearch is an open source search and analytics engine that allows you to store, search, and analyze big volumes of data in real time. We will cover the minimum steps you’ll need to install ElasticSearch 7 on CentOS 7, …

Read More »

Create a custom cracking Wordlist

To perform a good pentest, nothing better than a custom wordlist to crack passwords. We may be able to generate a custom wordlist that reflects our knowledge of the target or the organization’s password policy (For example : 10chars min, Special chars …) Information Gathering To build a good wordlist, …

Read More »

Monitor Windows security events with Centreon & NsClient++

If you don’t have any SIEM yet, you can start to monitor some Windows security events with Centreon & NsClient++. We’ll use the sheet cheat Top Windows events you should monitor to help us create desired services :) Prerequisites You need to have the following features already implemented : a …

Read More »

Top Windows events you should monitor

Windows security logo

Your infrastructure continuously generates log data that you can use to monitor network infrastructure and manage security events. I share you my cheat sheet of importants events that I used to monitor, but before, lets activate all the logs we need 1 / Enable Advanced auditing For some events we’ld …

Read More »