Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • The TLJH
  • Basic Configuration
  • More Configuration
  • Conclusion

Was this helpful?

  1. Computer/Cyber Security
  2. My Current Blue Team Operation

JupyterHub Configuration Guide

31/1/2023 Using TLJH (The littlest JupyterHub) is better option for a small team and using one server

PreviousGeneral PlaybookNextHow to train your Blue Team

Last updated 1 year ago

Was this helpful?

31/1/2023 I just the Littlest Jupyter Hub which is much easier to set up

The TLJH

I decided that I will use the TLJH for my Security Team's Jupyter Hub after I read the documentation and did some lab with it ()

My Goal is to set up a Jupyter Hub for my team so that they can share their Jupyter notebook and also I can manage the Analyst that is actively crafting notebooks and making use of it.

The TLJH has something called the TLJH Installer which is small and easy to configure (You can read that in the documentation)

Basic Configuration

I use a VM that runs Ubuntu 18.04 to host this JupyterHub Server with a storage of 70GB and 4GB of RAM

Using this command to download the installer and set up my version of JupyterHub, the user environment will include:

  • pandas

  • matplotlibs

  • networkx

  • pyvis

  • voila

  • And a shared directory

curl -L https://tljh.jupyter.org/bootstrap.py \
    | sudo python3 - \ --admin admin --show-progress-page \
    --user-requirements-txt-url https://raw.githubusercontent.com/https://raw.githubusercontent.com/Zeroska/tljh-user-env-requirement/main/requirement.txt
    --plugin git+https://github.com/kafonek/tljh-shared-directory --plugin git+https://github.com/Zeroska/tljh-voila-gallery@master

These will get you up and running but if you don't like the environment you can change the requirement or the shared folder's name

More Configuration

After the basic configuration, you might want to configure how the user will log in, and which port should we expose, I write a script that automates those stuff for you

#/bin/bash
$PORT = 8888

echo "Start the Configuration"
sudo tljh-config set http.port ${PORT} # Set the port which you connected to
sudo tljh-config reload proxy 

Summary the script will do these things:

  • Expose port 8888 for the user to connect via IP Address

  • Setup the Authentication (The user will change the password when login for the first time) which is set up by default (you have to go to this path <your_server_ip>/hub/auth/change-password) to change your password

Conclusion

Running this to help my team take notes and do data analysis is wonderful. Combine it with VLAN Monitoring you got yourself an interactive documentation.

💙
https://tljh.jupyter.org/en/latest/