Search:

Type: Posts; User: aciscorouter; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.03 seconds.

  1. Replies
    23
    Views
    73,732

    Where did the .zip file go? Anyone know where I...

    Where did the .zip file go? Anyone know where I can find this? Haven't seen the attachment since the site was updated a year ago...
  2. Replies
    8
    Views
    3,083

    Where did he tutorial go?

    Since the site was updated last year I can no longer find the tutorial...
  3. Replies
    24
    Views
    16,712

    What is the current sustained backplane bandwidth...

    What is the current sustained backplane bandwidth on your existing layer2 device? One advantage of the layer3 switch approach is the ability to VLAN and route traffic on the same backplane while...
  4. Replies
    21
    Views
    39,448

    Superscan!...

    Superscan! http://www.foundstone.com/resources/freetooldownload.htm?file=superscan4.zip
  5. We have layer 2, 802.1x encapsulating MS-CHAPv2...

    We have layer 2, 802.1x encapsulating MS-CHAPv2 in a Protected EAP session (PEAP) to a Microsoft IAS (RADIUS) server which in turn provides Active Directory challenge response to both user and...
  6. Replies
    4
    Views
    5,054

    Consider the following: * Servers - OS, Web, DB...

    Consider the following:
    * Servers - OS, Web, DB hardening / bastioning / latest patches
    * Firewall rules and DMZ location (Web server should not be on the same segment as the SQL server if the Web...
  7. Replies
    5
    Views
    6,963

    The problem with most content is that you need to...

    The problem with most content is that you need to download it to view it. If you share it as PPS or PPT the users still have to download locally to view it. Even if you were to go as far as to use...
  8. Replies
    14
    Views
    12,702

    In terms of security, there are a number of...

    In terms of security, there are a number of vulnerabilities that exist for both OOP languages. What sort of audience will be viewing your site? A lot of corporate security policies turn both Java...
  9. Replies
    25
    Views
    28,365

    Many governments secretly sanction the use of...

    Many governments secretly sanction the use of antiforensics and countersurveillance and have been in the state of developing tools, standards and protocols for some time, it's not something you hear...
  10. Replies
    14
    Views
    11,392

    As alleyCat suggested earlier: Portscanning...

    As alleyCat suggested earlier:

    Portscanning
    From Wikipedia , the free encyclopedia
    Jump to: navigation, search
    A Port Scan is one of the most popular reconnaissance techniques attackers use to...
  11. Replies
    25
    Views
    21,795

    I personally love the fact I can go anywhere in...

    I personally love the fact I can go anywhere in my Vibe with my laptop and pringle can and find Internet access! I'm at the park with my kid and can check my email, I go on vacation and we can check...
  12. Replies
    14
    Views
    11,392

    I defo stand corrected on this one. I have...

    I defo stand corrected on this one. I have misused the meaning in the past and have recently read that very article on Port Knocking that you referred me to, but obviously hadn't digested it. ...
  13. Replies
    14
    Views
    11,392

    Reconnaissance is the first thing that an...

    Reconnaissance is the first thing that an attacker will do to find a juicey target. Port scans (aka port knocking) is only one form of recon (war-dialing is another example) and it serves the...
  14. Replies
    32
    Views
    18,484

    He might have been running Cain & Abel to crack...

    He might have been running Cain & Abel to crack IE's MRU hashes, He may have been running a plugin on the browser that remembers passwords (without prompting the user), possibly the keylogger or else...
  15. MadAxe, may I suggest you build yourself a Linux...

    MadAxe, may I suggest you build yourself a Linux gateway and implement IPtables? There are tons of resources and HOWTO's out there that will help you understand the basics. Then there are a...
  16. Replies
    6
    Views
    34,471

    Here's the command syntax for resolving netbios names:

    CMD> nbtstat -a xxx.xxx.xxx.xxx <-- X being the IP address

    If you are using Linux there is a cool Linux NBTSTAT client created by BindView who was just aquired by Symantec (but the tool is still...
  17. Replies
    15
    Views
    12,300

    Hey I agree with the other suggestions. Go to...

    Hey I agree with the other suggestions. Go to SANS reading room, do some social engineering but the real work is getting your corporate echelons to agree and ratify standards. We were tasked with...
  18. Replies
    10
    Views
    11,821

    PIX hardening guide...

    And no firewall administrator is complete without a hardening guide foucussed on the PIX and some methodology behind firewall administration - Get the Guide Here :D
  19. Totally agree with that. Unless you are a...

    Totally agree with that. Unless you are a government agency or have conversations with users on your LAN about the Caramilk secret, encrypting the data is overkill. MAC filtering will not allow...
  20. Thread: HACK inn

    by aciscorouter
    Replies
    58
    Views
    40,268

    Hey there, I posted a tutorial/guideline last...

    Hey there, I posted a tutorial/guideline last year for hardening the configuration of a Cisco router - My Tutorial

    Hope this helps...

    Gary
  21. Replies
    3
    Views
    8,911

    Linux SecAdmin - Look Who's Knocking

    Linux SecAdmin - Look Who's Knocking
    Written By Gary Freeman - a.k.a. Aciscorouter
    Tuesday February 7 2006 @ 17:35

    DISCLAIMER: This is a tutorial of sorts that takes you through a day-to-day...
  22. Replies
    8
    Views
    3,083

    Wow, thanks phernandez... I didn't think to look...

    Wow, thanks phernandez... I didn't think to look at the spotlight articles until today and came across the link to Enterprise IT Planet's review. This is great :D

    Cheers,
  23. Replies
    12
    Views
    13,853

    Nice one mate! I have finished the investigation...

    Nice one mate! I have finished the investigation already and I'm looking for a way to justify my numbers but I know the average website visit is between 6 and 12 GET requests per page (did a dirty...
  24. Replies
    12
    Views
    13,853

    :D Damn skippy! I agree 100%. HR are such...

    :D Damn skippy! I agree 100%. HR are such techno-phobes that everything is taken literally and they see 100 alerts as 100 visits to a website. Try explaining anything to them and their eyes glaze...
  25. Replies
    12
    Views
    13,853

    No, we have ISA implemented for our call centers...

    No, we have ISA implemented for our call centers but in the main data center the users can access the Internet without any caching or proxying. We tried caching and sending the data to a log...
Results 1 to 25 of 35
Page 1 of 2 1 2