Security Audit

Audit DC/OS Service via Prometheus/Filebeat

Reading Time: 3 minutes In our previous blog post, How to audit DC/OS Services?, we learned how to locally audit service/app in DC/OS via dcos-adminrouter.service. This blog is in continuation of the previous one and here we will explore how we can audit DC/OS Service via Prometheus /Filebeat. Quick Recap We have seen that DC/OS doesn’t provides any web interface is to track the change in service/app configs , Continue Reading

How to audit DC/OS Services?

Reading Time: 4 minutes DC/OS is a distributed systems kernel that lets you manage multiple machines as if they were a single computer. Its included web interface facilitates user to interact with its services. Now, this is where it gets quite messy to keep track of the users who are interacting with the services running in the cluster. It is the responsibility of the cluster-admin to keep track and Continue Reading

How to start with Vega : The web security scanner?

Reading Time: 3 minutes Vega – Web security scanner and web security testing platform. Alright, Today I have come up with an interesting topic which is Vega and this blog is inspired by the last blog I wrote on web security. Vega is nothing but a tool, we will talk more about Vega in a while but let’s first talk ‘Why Vega’. So, next when you are done with your Continue Reading

Handling HTTPS requests with Akka-HTTPS Server

Reading Time: 2 minutes Hi guys, In my last blogs I explained how one can create a self-signed certificate and KeyStore in PKCS12. You can go through the previous blog, as we’ll be needing certificate and keystore  for handling HTTPS requests. https://blog.knoldus.com/2016/10/18/create-a-self-signed-ssl-certificate-using-openssl/ https://blog.knoldus.com/2016/10/26/how-to-create-a-keystore-in-pkcs12-format/ Akka-HTTP provides both Server-Side and Client-Side HTTPS support. In this blog I’ll be covering the Server-Side HTTPS support. Let’s start with “why do we need server-side HTTPS support?” If we want the communication between the browser and Continue Reading

How to build secure Web Application

Reading Time: 4 minutes We all use web applications everyday whether we consciously know it or not. That is, all of us who browse the web. Now a days we have seen a significant surge in the amount of web application specific vulnerabilities that are disclosed to the public. No web application technology has shown itself invulnerable, and discoveries are made every day that affect both owners and users security and privacy. Security Continue Reading