<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://greenthenics.github.io/</id><title>Sahil Rawat</title><subtitle>A minimal, responsive and feature-rich Jekyll theme for technical writing.</subtitle> <updated>2026-04-07T14:20:58+00:00</updated> <author> <name>Sahil Rawat</name> <uri>https://greenthenics.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://greenthenics.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://greenthenics.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Sahil Rawat </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Part 3: The Guardian — IDS Tuning &amp; DoS Defense</title><link href="https://greenthenics.github.io/posts/part-3-the-guardian-ids-tuning-and-dos-defense/" rel="alternate" type="text/html" title="Part 3: The Guardian — IDS Tuning &amp;amp; DoS Defense" /><published>2026-04-07T14:04:11+00:00</published> <updated>2026-04-07T14:04:11+00:00</updated> <id>https://greenthenics.github.io/posts/part-3-the-guardian-ids-tuning-and-dos-defense/</id> <content type="text/html" src="https://greenthenics.github.io/posts/part-3-the-guardian-ids-tuning-and-dos-defense/" /> <author> <name>Sahil Rawat</name> </author> <category term="Home Lab" /> <category term="Cybersecurity" /> <summary>Introduction In our journey so far, we’ve built a functional virtual network and hosted a vulnerable target behind a pfSense firewall. Now, we’re taking it to the next level by transforming our lab into an intelligent system that doesn’t just block traffic, but “sees” and “stops” attacks in real-time. In this part, we’ll focus on Active Defense using Suricata IDS/IPS and implementing advanced ...</summary> </entry> <entry><title>Part 2: The Target — Hosting DVWA behind the Shield</title><link href="https://greenthenics.github.io/posts/part-2-the-target-hosting-dvwa-behind-the-shield/" rel="alternate" type="text/html" title="Part 2: The Target — Hosting DVWA behind the Shield" /><published>2026-04-07T13:45:10+00:00</published> <updated>2026-04-07T13:45:10+00:00</updated> <id>https://greenthenics.github.io/posts/part-2-the-target-hosting-dvwa-behind-the-shield/</id> <content type="text/html" src="https://greenthenics.github.io/posts/part-2-the-target-hosting-dvwa-behind-the-shield/" /> <author> <name>Sahil Rawat</name> </author> <category term="Home Lab" /> <category term="Cybersecurity" /> <summary>Introduction In the previous part, we laid the foundation by setting up our virtual network and pfSense firewall. Now, it’s time to bring in our first target: DVWA (Damn Vulnerable Web Application). In this post, we’ll focus on hosting this application behind our pfSense shield using Docker and configuring port forwarding to make it accessible. 4. Internet Access for Ubuntu Since Ubuntu’s ...</summary> </entry> <entry><title>Part 1: The Foundation - Virtual Networking &amp; pfSense</title><link href="https://greenthenics.github.io/posts/part-1-the-foundation-virtual-networking-and-pfsense/" rel="alternate" type="text/html" title="Part 1: The Foundation - Virtual Networking &amp;amp; pfSense" /><published>2026-04-07T12:54:15+00:00</published> <updated>2026-04-07T12:54:15+00:00</updated> <id>https://greenthenics.github.io/posts/part-1-the-foundation-virtual-networking-and-pfsense/</id> <content type="text/html" src="https://greenthenics.github.io/posts/part-1-the-foundation-virtual-networking-and-pfsense/" /> <author> <name>Sahil Rawat</name> </author> <category term="Home Lab" /> <category term="Networking" /> <summary>Introduction Welcome to the first part of our series on building a secure and scalable virtual laboratory. In this post, we will cover the foundational steps of setting up virtual networking and configuring pfSense as our primary firewall and router. Network Topology Make sure your to give atleast 4GB of RAM and 2 Processors to both Ubuntu and Kali VM for smooth performance. Table of...</summary> </entry> </feed>
