August 16th, 2006, 02:05 AM
If I follow, you want to "fuzz" your PIX to test for isakmp vulnerabilities. If so, you may be interested in the protos isakmp fuzzer. ...
July 19th, 2006, 01:01 AM
In regards to port security, I have seen companies (or more commonly government agencies) go down the road of specifically defining the "secure MACs" for each port and only allowing those MACs. This...
July 12th, 2006, 02:27 PM
Very good questions, it looks like you are well on your way. Of course there is no single report that says "we are PCI compliant". If you find one, you'd be a rich man. :)
What I refer to are...
July 11th, 2006, 05:58 PM
Don't get me wrong, a PCI audit is a time consuming, costly, political, frustrating process but at the end of the day don't seem to truly increase security. At the size of business I work with,...
July 11th, 2006, 02:31 PM
Maybe Im used to PCI (or what had been CISP) audits, but they aren't bad. Most of the PCI requirements are pretty common sense, and depending on how large of a processor you are dealing with the...
June 19th, 2006, 10:18 PM
Ah crap. Don't I feel stupid replying to a 4 month old post. Sorry.
June 19th, 2006, 08:07 PM
As Pecosian mention, this looks to be a standard assymetric encryption algorithm in the one-way function family:
"Fy,n(X) =Y^X mod N"
As most are probably aware, RSA and Diffie Hellman algorithms...
June 19th, 2006, 07:20 PM
Perhaps I missed something, but how does one use NMAP to get MAC addresses remotely (ie when there is a router/layer 3 device between yourself and the scanned target)? If truly possible, that could...
June 19th, 2006, 06:18 PM