A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/da_667/collections/featured",
"type": "OrderedCollection",
"totalItems": 5,
"orderedItems": [
{
"id": "https://infosec.exchange/users/da_667/statuses/111348366381979054",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2023-11-03T19:53:55Z",
"url": "https://infosec.exchange/@da_667/111348366381979054",
"attributedTo": "https://infosec.exchange/users/da_667",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/da_667/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/da_667/statuses/111348366381979054",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2023-11-03:objectId=107651277:objectType=Conversation",
"content": "<p>looks like my DoH toot is making waves again. Don't make me tap the fucking sign.</p>",
"contentMap": {
"en": "<p>looks like my DoH toot is making waves again. Don't make me tap the fucking sign.</p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/111/348/365/748/693/138/original/d2adbe2cdccc2c87.jpg",
"name": null,
"blurhash": "URGbxhroD*WX0OWGx^nzkrwZWYWZ?vRjIpog",
"width": 500,
"height": 739
}
],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/da_667/statuses/111348366381979054/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/da_667/statuses/111348366381979054/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/da_667/statuses/111348366381979054/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/da_667/statuses/111348366381979054/likes",
"type": "Collection",
"totalItems": 62
},
"shares": {
"id": "https://infosec.exchange/users/da_667/statuses/111348366381979054/shares",
"type": "Collection",
"totalItems": 21
}
},
{
"id": "https://infosec.exchange/users/da_667/statuses/111109271098182858",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/da_667/statuses/111109191465278888",
"published": "2023-09-22T14:28:50Z",
"url": "https://infosec.exchange/@da_667/111109271098182858",
"attributedTo": "https://infosec.exchange/users/da_667",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/da_667/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/da_667/statuses/111109271098182858",
"inReplyToAtomUri": "https://infosec.exchange/users/da_667/statuses/111109191465278888",
"conversation": "tag:infosec.exchange,2023-09-22:objectId=96945971:objectType=Conversation",
"content": "<p>I would also like to note that all of these points apply to the "privacy minded individual", and not necessarily to "Enterprise Ops/Security".</p><p>When I first started talking shit about DoH being bad, I got told that I'm not cypherpunk. Sounds pretty fuckin' cypherpunk, giving corporate entities who have proven they give zero fucks about you even more of your data.</p><p>But I digress. From the point of view of systems administration and support, its also a fucking nightmare for enforcing policy, and troubleshooting connectivity problems, because the web browser now believes it has the right to be handling DNS resolutions independent of your operating system settings.</p><p>On top of that, you have no idea what domains are being resolved, how they're being resolved, or where to even start to troubleshooting the problem.</p><p>From a network security perspective, its pretty much the same can of worms. DoH providers are allowed to have your DNS queries, but you aren't allowed to have that for trying to figure out if any of your hosts are infected, and calling back to a C2 somewhere in the middle of Russia.</p><p>DNS logs have always been a troubleshooting tool. The fact is, you're making them opaque, and given them to an external entity. "Its always DNS" is a joke until it isn't and you have to figure out whats wrong. Only the DNS queries are opaque now, making this shit much more difficult than it needs to be.</p>",
"contentMap": {
"en": "<p>I would also like to note that all of these points apply to the "privacy minded individual", and not necessarily to "Enterprise Ops/Security".</p><p>When I first started talking shit about DoH being bad, I got told that I'm not cypherpunk. Sounds pretty fuckin' cypherpunk, giving corporate entities who have proven they give zero fucks about you even more of your data.</p><p>But I digress. From the point of view of systems administration and support, its also a fucking nightmare for enforcing policy, and troubleshooting connectivity problems, because the web browser now believes it has the right to be handling DNS resolutions independent of your operating system settings.</p><p>On top of that, you have no idea what domains are being resolved, how they're being resolved, or where to even start to troubleshooting the problem.</p><p>From a network security perspective, its pretty much the same can of worms. DoH providers are allowed to have your DNS queries, but you aren't allowed to have that for trying to figure out if any of your hosts are infected, and calling back to a C2 somewhere in the middle of Russia.</p><p>DNS logs have always been a troubleshooting tool. The fact is, you're making them opaque, and given them to an external entity. "Its always DNS" is a joke until it isn't and you have to figure out whats wrong. Only the DNS queries are opaque now, making this shit much more difficult than it needs to be.</p>"
},
"updated": "2023-09-22T14:32:41Z",
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/da_667/statuses/111109271098182858/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/da_667/statuses/111109271098182858/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/da_667/statuses/111109271098182858/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/da_667/statuses/111109271098182858/likes",
"type": "Collection",
"totalItems": 46
},
"shares": {
"id": "https://infosec.exchange/users/da_667/statuses/111109271098182858/shares",
"type": "Collection",
"totalItems": 10
}
},
{
"id": "https://infosec.exchange/users/da_667/statuses/111109191465278888",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2023-09-22T14:08:35Z",
"url": "https://infosec.exchange/@da_667/111109191465278888",
"attributedTo": "https://infosec.exchange/users/da_667",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/da_667/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/da_667/statuses/111109191465278888",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2023-09-22:objectId=96945971:objectType=Conversation",
"content": "<p>Time for me to reiterate why I think DOH is fucking garbage. This is the cliffnotes version:</p><p>-If you read the RFC, never once is privacy listed as a goal for the protocol<br />-Ostensibly, you get some privacy on the first hop, but from there, you have zero guarantees on literally anything. You have promises from various companies, but that doesn't mean jack shit.<br />-I'd like you to consider that cloudflare doesn't have a good track record of policing abuse of their platforms, they tacitly support white supremecists and terrorists, they've been known to forward abuse requests containing personal information of those who have submitted them to their abusers, and they have zero financial incentive to stop the flow of traffic. THIS INCLUDES MALWARE, THERE IS SO MUCH FUCKING MALWARE USING CLOUDFLARE. They are a default DoH provider choice in the major browsers that support it.<br />-Transaction ID is always set to zero for DoH requests to improve caching. This is actually written into the protocol. Y'all know why the transaction ID/DNS ID exists, right? This opens up attack paths for man in the middle attacks. Think QUANTUM and PRISM-type bullshit, where the answer to your DNS query is changed but you'll never know.<br />-The only goal of the protocol was to move DNS resolution to the browser, so that the browser is cognizant of how domains are being resolved. Its anti-adblocking tech. <br />-Think about who the major players are behind DoH - It was driven by Cloudflare, Mozilla, and Google. and while I like Firefox, they all have financial incentive to see how domain resolution is occuring and ensure ads are delivered to clients. Y'all are aware of google's Web Integrity web DRM shit, right? How much you wanna bet that if it becomes a standard, there will be websites popping up whereby resolution via DoH is required for viewing the content? I wonder why that would be?<br />-Flow analysis easily reveals which HTTPS traffic is likely to be DoH traffic. You can't hide connection metadata.<br />-Several tools have been developed to used DoH as C2, and even file storage, if you're brave enough.</p>",
"contentMap": {
"en": "<p>Time for me to reiterate why I think DOH is fucking garbage. This is the cliffnotes version:</p><p>-If you read the RFC, never once is privacy listed as a goal for the protocol<br />-Ostensibly, you get some privacy on the first hop, but from there, you have zero guarantees on literally anything. You have promises from various companies, but that doesn't mean jack shit.<br />-I'd like you to consider that cloudflare doesn't have a good track record of policing abuse of their platforms, they tacitly support white supremecists and terrorists, they've been known to forward abuse requests containing personal information of those who have submitted them to their abusers, and they have zero financial incentive to stop the flow of traffic. THIS INCLUDES MALWARE, THERE IS SO MUCH FUCKING MALWARE USING CLOUDFLARE. They are a default DoH provider choice in the major browsers that support it.<br />-Transaction ID is always set to zero for DoH requests to improve caching. This is actually written into the protocol. Y'all know why the transaction ID/DNS ID exists, right? This opens up attack paths for man in the middle attacks. Think QUANTUM and PRISM-type bullshit, where the answer to your DNS query is changed but you'll never know.<br />-The only goal of the protocol was to move DNS resolution to the browser, so that the browser is cognizant of how domains are being resolved. Its anti-adblocking tech. <br />-Think about who the major players are behind DoH - It was driven by Cloudflare, Mozilla, and Google. and while I like Firefox, they all have financial incentive to see how domain resolution is occuring and ensure ads are delivered to clients. Y'all are aware of google's Web Integrity web DRM shit, right? How much you wanna bet that if it becomes a standard, there will be websites popping up whereby resolution via DoH is required for viewing the content? I wonder why that would be?<br />-Flow analysis easily reveals which HTTPS traffic is likely to be DoH traffic. You can't hide connection metadata.<br />-Several tools have been developed to used DoH as C2, and even file storage, if you're brave enough.</p>"
},
"updated": "2023-09-22T14:13:28Z",
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/da_667/statuses/111109191465278888/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/da_667/statuses/111109191465278888/replies?min_id=111109271098182858&page=true",
"partOf": "https://infosec.exchange/users/da_667/statuses/111109191465278888/replies",
"items": [
"https://infosec.exchange/users/da_667/statuses/111109271098182858"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/da_667/statuses/111109191465278888/likes",
"type": "Collection",
"totalItems": 207
},
"shares": {
"id": "https://infosec.exchange/users/da_667/statuses/111109191465278888/shares",
"type": "Collection",
"totalItems": 130
}
},
{
"id": "https://infosec.exchange/users/da_667/statuses/109288847892751709",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-05T02:31:16Z",
"url": "https://infosec.exchange/@da_667/109288847892751709",
"attributedTo": "https://infosec.exchange/users/da_667",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/da_667/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/da_667/statuses/109288847892751709",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2022-11-05:objectId=20016830:objectType=Conversation",
"content": "<p><a href=\"https://infosec.exchange/tags/introduction\" class=\"mention hashtag\" rel=\"tag\">#<span>introduction</span></a> <a href=\"https://infosec.exchange/tags/introductions\" class=\"mention hashtag\" rel=\"tag\">#<span>introductions</span></a> <a href=\"https://infosec.exchange/tags/reintroduction\" class=\"mention hashtag\" rel=\"tag\">#<span>reintroduction</span></a> <a href=\"https://infosec.exchange/tags/reintroductions\" class=\"mention hashtag\" rel=\"tag\">#<span>reintroductions</span></a><br />holy shit, I step out for dinner and theres /more/ of you following me. I gained nearly 200 followers in a single day.</p><p>As always, welcome to infosec.exchange.</p><p>I'm assuming if you found me, someone misguided you, or you are aware of the image macros and spam that rule my feed. I always aim for that SSS rating:</p><p>Suffering<br />Shitposting<br />Security news</p><p>My background is, of course, in cybersecurity. I have a bit over a decade of experience in infosec in general, with the vast majority of that spent on the blue team, and in private sector, but with a little bit of time on the red team in the intel community.</p><p>My specialization is network security monitoring. Some call it NIDS, some call it DPI, some call it IDS/IPS, a few call it NGFW and NGIPS to sound sophisticated, but I stare at pcaps, do pattern recognition, and write signatures or rules for Snort and Suricata to detect anomalous traffic that repeat unique patterns. That's my job in a nutshell.</p><p>IDS/IPS work requires a broad understanding of network protocols, and sometimes, some guesswork and a lot of sandbox runs when you're encountering C2 traffic to figure out the constants and variables.</p><p>I also wrote a book on creating virtual machine labs for learning IT and infosec concepts. I'm not gonna tell you to buy my shit, especially when you can get it for free if you really want it. Check out the other pinned toot for details.</p><p>In my spare time, I like to be a part of the life of my wife who is a first-grade teacher, and my two beautiful and very happy bassett hounds. I also play a lot of video games (I enjoy rogue-likes, rogue-lites, turn-based strategy, RPGs, and generally most indie titles), red a lot of manga, and watch a lot of anime (My favorite genre/trope is typically isekai. I love escapism, made rises to power, and seeing how creative storytellers get with the mechanics of the world that they just dropped someone into who is over or underpowered as hell). I grew up in MI, left, and came back. Its very likely I'll die here. I love this place, especially the northern parts of the state, and one day dream of owning land or maybe even a very modest vacation home somewhere in the north reaches. Maybe someday, but I digress.</p><p>I have a reputation for being a prolific shitposter, but generally that's because life is way too fucking short to take seriously. Some people got a laugh out of it, some didn't. If I'm too high volume, I apologize. I won't be offended if you unfollow, block, mute, whatever. You do what you have to.</p><p>In spite of all the noise, I'm somewhat enthusiastic about security and NSM (network security monitoring) in general, and happy to answer questions if i can, and if I can't try to point you to better sources of information.</p><p>That's enough about me. I'm gonna have you play a game. Playing this game is entirely optional, but I wanna know more about you. If you drop me a follow, or have dropped me a follow, please tell me why. Thanks.</p>",
"contentMap": {
"en": "<p><a href=\"https://infosec.exchange/tags/introduction\" class=\"mention hashtag\" rel=\"tag\">#<span>introduction</span></a> <a href=\"https://infosec.exchange/tags/introductions\" class=\"mention hashtag\" rel=\"tag\">#<span>introductions</span></a> <a href=\"https://infosec.exchange/tags/reintroduction\" class=\"mention hashtag\" rel=\"tag\">#<span>reintroduction</span></a> <a href=\"https://infosec.exchange/tags/reintroductions\" class=\"mention hashtag\" rel=\"tag\">#<span>reintroductions</span></a><br />holy shit, I step out for dinner and theres /more/ of you following me. I gained nearly 200 followers in a single day.</p><p>As always, welcome to infosec.exchange.</p><p>I'm assuming if you found me, someone misguided you, or you are aware of the image macros and spam that rule my feed. I always aim for that SSS rating:</p><p>Suffering<br />Shitposting<br />Security news</p><p>My background is, of course, in cybersecurity. I have a bit over a decade of experience in infosec in general, with the vast majority of that spent on the blue team, and in private sector, but with a little bit of time on the red team in the intel community.</p><p>My specialization is network security monitoring. Some call it NIDS, some call it DPI, some call it IDS/IPS, a few call it NGFW and NGIPS to sound sophisticated, but I stare at pcaps, do pattern recognition, and write signatures or rules for Snort and Suricata to detect anomalous traffic that repeat unique patterns. That's my job in a nutshell.</p><p>IDS/IPS work requires a broad understanding of network protocols, and sometimes, some guesswork and a lot of sandbox runs when you're encountering C2 traffic to figure out the constants and variables.</p><p>I also wrote a book on creating virtual machine labs for learning IT and infosec concepts. I'm not gonna tell you to buy my shit, especially when you can get it for free if you really want it. Check out the other pinned toot for details.</p><p>In my spare time, I like to be a part of the life of my wife who is a first-grade teacher, and my two beautiful and very happy bassett hounds. I also play a lot of video games (I enjoy rogue-likes, rogue-lites, turn-based strategy, RPGs, and generally most indie titles), red a lot of manga, and watch a lot of anime (My favorite genre/trope is typically isekai. I love escapism, made rises to power, and seeing how creative storytellers get with the mechanics of the world that they just dropped someone into who is over or underpowered as hell). I grew up in MI, left, and came back. Its very likely I'll die here. I love this place, especially the northern parts of the state, and one day dream of owning land or maybe even a very modest vacation home somewhere in the north reaches. Maybe someday, but I digress.</p><p>I have a reputation for being a prolific shitposter, but generally that's because life is way too fucking short to take seriously. Some people got a laugh out of it, some didn't. If I'm too high volume, I apologize. I won't be offended if you unfollow, block, mute, whatever. You do what you have to.</p><p>In spite of all the noise, I'm somewhat enthusiastic about security and NSM (network security monitoring) in general, and happy to answer questions if i can, and if I can't try to point you to better sources of information.</p><p>That's enough about me. I'm gonna have you play a game. Playing this game is entirely optional, but I wanna know more about you. If you drop me a follow, or have dropped me a follow, please tell me why. Thanks.</p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/introduction",
"name": "#introduction"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/introductions",
"name": "#introductions"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/reintroduction",
"name": "#reintroduction"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/reintroductions",
"name": "#reintroductions"
}
],
"replies": {
"id": "https://infosec.exchange/users/da_667/statuses/109288847892751709/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/da_667/statuses/109288847892751709/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/da_667/statuses/109288847892751709/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/da_667/statuses/109288847892751709/likes",
"type": "Collection",
"totalItems": 60
},
"shares": {
"id": "https://infosec.exchange/users/da_667/statuses/109288847892751709/shares",
"type": "Collection",
"totalItems": 10
}
},
{
"id": "https://infosec.exchange/users/da_667/statuses/109254622355262284",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-10-30T01:27:16Z",
"url": "https://infosec.exchange/@da_667/109254622355262284",
"attributedTo": "https://infosec.exchange/users/da_667",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/da_667/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/da_667/statuses/109254622355262284",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2022-10-30:objectId=19778892:objectType=Conversation",
"content": "<p>I mentioned in my profile and on my introduction that a wrote a book -- Building Virtual Machine Labs. Then a few years later, I wrote a second edition that is considerably more comprehensive.</p><p>I self-published via amazon's KDP, and via the online platform, leanpub. The dead tree format on amazon comes in two parts, because my book is over 1,000 pages of content. Its a bit pricey, but trust me, I'm not making much of a profit margin.</p><p>The digital edition on leanpub on the other hand? I made it pay what you want. You have no money? You wanna try it before you buy it? You were planning on pirating it? Thats all fine. I would rather you get the content from a reliable provider than try and download it from a sketchy site.</p><p>My book covers the basics virtualization</p><p>-Hosted vs. Baremetal hypervisors<br />-Virtual network segment types<br />-Virtual switching<br />-Hardware resource requirements and resource balancing<br />-Acquiring hardware<br />-Choosing (one of a choice of five) your hypervisor<br />-Configuring a baseline lab environment on one of those five hypervisor<br />-Configuring core network services (DHCP, DNS, NTP, Squid Proxy) and network firewall policy for your lab environment<br />-Routing and remote access for hosted and/or baremetal lab environments<br />-Installing and configuring Snort3 or Suricata<br />-Installing Splunk Enterprise<br />-Ideas on how to expand your lab beyond the baseline we build in the book together<br />-Extra content (password manager recommendations, etc.)</p><p>This thing is fully illustrated, and is 90% of the reason the book is so huge, because I wanted to accommodate visual learners. Buy or don't, but maybe share it with your friends trying to hope into IT/Infosec, and looking for homelab advice.</p><p>Digital (PDF) edition (free/pay-what-you-want):<br />leanpub.com/avatar2</p><p>Black and white print:<br />vol I: <a href=\"https://www.amazon.com/dp/B09GXHNJFC\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">amazon.com/dp/B09GXHNJFC</span><span class=\"invisible\"></span></a><br />vol II: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GXPMY9M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GXPMY9M</span></a></p><p>Color:<br />vol I: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GXD7QL8\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GXD7QL8</span></a><br />vol II: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GZJPYFX\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GZJPYFX</span></a></p>",
"contentMap": {
"en": "<p>I mentioned in my profile and on my introduction that a wrote a book -- Building Virtual Machine Labs. Then a few years later, I wrote a second edition that is considerably more comprehensive.</p><p>I self-published via amazon's KDP, and via the online platform, leanpub. The dead tree format on amazon comes in two parts, because my book is over 1,000 pages of content. Its a bit pricey, but trust me, I'm not making much of a profit margin.</p><p>The digital edition on leanpub on the other hand? I made it pay what you want. You have no money? You wanna try it before you buy it? You were planning on pirating it? Thats all fine. I would rather you get the content from a reliable provider than try and download it from a sketchy site.</p><p>My book covers the basics virtualization</p><p>-Hosted vs. Baremetal hypervisors<br />-Virtual network segment types<br />-Virtual switching<br />-Hardware resource requirements and resource balancing<br />-Acquiring hardware<br />-Choosing (one of a choice of five) your hypervisor<br />-Configuring a baseline lab environment on one of those five hypervisor<br />-Configuring core network services (DHCP, DNS, NTP, Squid Proxy) and network firewall policy for your lab environment<br />-Routing and remote access for hosted and/or baremetal lab environments<br />-Installing and configuring Snort3 or Suricata<br />-Installing Splunk Enterprise<br />-Ideas on how to expand your lab beyond the baseline we build in the book together<br />-Extra content (password manager recommendations, etc.)</p><p>This thing is fully illustrated, and is 90% of the reason the book is so huge, because I wanted to accommodate visual learners. Buy or don't, but maybe share it with your friends trying to hope into IT/Infosec, and looking for homelab advice.</p><p>Digital (PDF) edition (free/pay-what-you-want):<br />leanpub.com/avatar2</p><p>Black and white print:<br />vol I: <a href=\"https://www.amazon.com/dp/B09GXHNJFC\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">amazon.com/dp/B09GXHNJFC</span><span class=\"invisible\"></span></a><br />vol II: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GXPMY9M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GXPMY9M</span></a></p><p>Color:<br />vol I: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GXD7QL8\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GXD7QL8</span></a><br />vol II: <a href=\"https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GZJPYFX\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">amazon.com/Building-Virtual-Ma</span><span class=\"invisible\">chine-Labs-Hands/dp/B09GZJPYFX</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/da_667/statuses/109254622355262284/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/da_667/statuses/109254622355262284/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/da_667/statuses/109254622355262284/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/da_667/statuses/109254622355262284/likes",
"type": "Collection",
"totalItems": 55
},
"shares": {
"id": "https://infosec.exchange/users/da_667/statuses/109254622355262284/shares",
"type": "Collection",
"totalItems": 24
}
}
]
}