• Cheat Sheets
    • Programming
      • Bash
      • docker-compose
      • Dockerfile
      • Markdown
      • MySQL
      • PHP
      • PowerShell
      • Python
    • Tools
      • AMSITrigger
      • aria2
      • bettercap
      • binwalk
      • chisel
      • ciphey
      • docker
      • docker-compose
      • Empire
      • exiftool
      • foremost
      • h8mail
      • hashcat
      • hcxtools
      • hugo
      • Hydra
      • Metasploit
      • mitm6
      • msfvenom
      • Name-That-Hash
      • ncat
      • Nmap
      • ntlmrelayx
      • openssl
        • s_client
      • PSDNSDumpsterAPI
      • psexec
      • Rdesktop
      • responder
      • Search-That-Hash
      • searchsploit
      • smb
      • steghide
      • sublist3r
      • theHarvester
      • ThreatCheck
      • usbrip
      • whatweb
    • Unix
      • apt
      • awk
      • base64
      • bzip2
      • chmod
      • cron
      • curl
      • cut
      • dig
      • file
      • find
      • ftp
      • gpg
      • grep
      • gzip gunzip zcat
      • md5sum
      • ntp
      • rev
      • scp
      • sed
      • showmount
      • sort
      • strings
      • tar
      • tmux
      • touch
      • tr
      • uniq
      • watch
      • wc
      • xxd
    • Windows
      • NET
      • runas
  • Guides
    • printnightmare
    • Ubuntu VPS
      • 00. Introduction
      • 01. Adding users
      • 02. Managing of packages
      • 03. File editor: vim
      • 04. UFW
      • 05. SSH Keys
      • 06. Setup sshd
      • 07. Unattended Upgrades
      • 08. Fail2ban
      • 09. Logwatch
      • 10. Sysctl Optimization
  • Notes
    • Courses
      • Blackhat Python
      • Breaching The Cloud
      • Python4N00bs
      • The Cyber Mentor
    • CTFs
      • Graficom Spoorzoeker
        • Challanges
        • Solutions
      • HTB
        • Bashed
        • Blue
        • Devel
        • Grandpa
        • Granny
        • Jerry
        • Lame
        • Legacy
        • Netmon
        • Nibbles
        • Optimum
      • OverTheWire
        • Bandit
        • Natasa
      • underthewire
        • century
        • cyborg
      • VulnHub
        • Fristileaks
        • Kioptrix
          • Level 1
          • Level 2
          • Level 3
          • Level 4
        • Pwnlab
        • Stapler
        • Vulnix
      • Vulnserver
        • TRUN
    • Hacking Methodology
      • External
        • Misconfigured Cloud Assets
        • Phising
        • Post Exploit
          • cloud-provider-web-servers
          • rdp
          • Remote UAC
        • recon
          • Certificate Transparency Logs
          • Credential Gathering
          • DNS Recon
          • E-Mail Gathering
          • Google Dorking
          • Identify Technologies
          • public key disclosure
          • Shodan
      • General
        • AV Bypass
          • Malware Test VM
        • Buffer Overflow
        • Discover Open Ports
        • encrypted password protected pdf
        • encrypted password protected zip
        • password cracking
          • rules
          • wordlists
        • Password Spraying
        • post compromise recon
        • priv esc
        • Redis
        • shell escaping
        • SQL Injection
        • Web
      • Internal
        • Active Directory
          • credentialaccess
          • IPv6 DNS Takeover
          • LLMNR and NBT-NS
          • SMB Relay
          • WPAD
        • postexploit
          • steal access tokens
    • Networking
      • OSI Model
        • Layer 1
        • Layer 2
        • Layer 3
        • Layer 4
        • Layer 5
        • Layer 6
        • Layer 7
      • TCP/IP Model
    • Random Things
      • backscatter
      • dash in file name
      • ssh sha256 to public key
    • Private

More

  • Github
  • Blog
  • Twitter
  • LinkedIn

Built with Hugo Learn and Hugo

> Guides > Ubuntu VPS
  • Ubuntu VPS
Guides

Ubuntu VPS

    00. Introduction

    Introduction to this guide.

    01. Adding users

    Adding users using the commandline.

    02. Managing of packages

    Managing packages using the commandline.

    03. File editor: vim

    Editing files using the commandline.

    04. UFW

    Setting up a basic firewall files using the commandline.

    05. SSH Keys

    Generating and setting up SSH Keys.

    06. Setup sshd

    Hardening the SSH Deamon.

    07. Unattended Upgrades

    Automating security updates and reboots.

    08. Fail2ban

    Setting up a Fail2Ban, a package that will automatically ban brute forcing IPs.

    09. Logwatch

    Setting up Logwatch, a package that parses logs files on your system and sends over a report.

    10. Sysctl Optimization

    Linux sysctl.conf parameter tweaking to improve memory management, network security, network performance.