<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Blogging on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/categories/blogging/</link>
    <description>Recent content in Blogging on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 20 Jan 2022 12:00:00 -0400</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/categories/blogging/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Vulnerability Management with Nessus in AWS</title>
      <link>https://blog.s4yhii.com/posts/2022-01-21-vuln-scan-with-nessus-in-aws/</link>
      <pubDate>Thu, 20 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-21-vuln-scan-with-nessus-in-aws/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this tutorial we will cover vulnerability scanning and vulnerability remediation. These are two of the main steps in the Vulnerability Management Lifecycle. We will be using Nessus Essentials to scan local VMs hosted on VMWare Workstation in order run credentialed scans to discover vulnerabilities, remediate some of the vulnerabilities.&lt;/p&gt;
&lt;h2 id=&#34;ec2-instance-setup&#34;&gt;EC2 Instance Setup&lt;/h2&gt;
&lt;p&gt;first step is launch an EC2 instance, the recommended requirements are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;windows OS&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt=&#34;Untitled&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/Vulnerability%20Management%20with%20Nessus%20in%20AWS%2090286706ffaf46128c3727fb6f6c7e58/Untitled.jpg&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;basic: t3 medium&lt;/li&gt;
&lt;li&gt;recommended: t3 xlarge&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Decrypt your password to login in a RDP session and use this to access your EC2 instance&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloud Resume Challenge</title>
      <link>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</link>
      <pubDate>Mon, 10 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</guid>
      <description>&lt;h1 id=&#34;cloud-resume-challenge&#34;&gt;Cloud Resume Challenge&lt;/h1&gt;
&lt;h2 id=&#34;setup-aws&#34;&gt;Setup AWS&lt;/h2&gt;
&lt;p&gt;Create your aws account&lt;/p&gt;
&lt;p&gt;Setup MFA for your roor account&lt;/p&gt;
&lt;p&gt;Create an IAM user&lt;/p&gt;
&lt;p&gt;Assign permission (Principle of Least privilege)&lt;/p&gt;
&lt;p&gt;Setup Vault (&lt;a href=&#34;https://github.com/99designs/aws-vault&#34;&gt;https://github.com/99designs/aws-vault&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;aws-vault add myuser ( ex: aws-vault add dev)&lt;/p&gt;
&lt;p&gt;aws-vault exex myuser — aws s3 ls&lt;/p&gt;
&lt;h2 id=&#34;setup-s3&#34;&gt;Setup S3&lt;/h2&gt;
&lt;p&gt;What is s3: file service useful for storing files usually for host a website&lt;/p&gt;
&lt;p&gt;What is AWS SAM: server less application model&lt;/p&gt;
&lt;p&gt;we will create an AWS Lambda (we ignore this for now)&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
