Search:

Type: Posts; User: organ; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    6,478

    If I follow, you want to "fuzz" your PIX to test...

    If I follow, you want to "fuzz" your PIX to test for isakmp vulnerabilities. If so, you may be interested in the protos isakmp fuzzer. ...
  2. Replies
    3
    Views
    6,614

    In regards to port security, I have seen...

    In regards to port security, I have seen companies (or more commonly government agencies) go down the road of specifically defining the "secure MACs" for each port and only allowing those MACs. This...
  3. Very good questions, it looks like you are well...

    Very good questions, it looks like you are well on your way. Of course there is no single report that says "we are PCI compliant". If you find one, you'd be a rich man. :)
    What I refer to are...
  4. Don't get me wrong, a PCI audit is a time...

    Don't get me wrong, a PCI audit is a time consuming, costly, political, frustrating process but at the end of the day don't seem to truly increase security. At the size of business I work with,...
  5. Not too bad

    Maybe Im used to PCI (or what had been CISP) audits, but they aren't bad. Most of the PCI requirements are pretty common sense, and depending on how large of a processor you are dealing with the...
  6. Replies
    7
    Views
    8,489

    Sure there are firewalls with 4 interfaces, but...

    Sure there are firewalls with 4 interfaces, but my question is how you intend to address your routing issue? With two internet connections you are talking two default routes and two different ISP...
  7. Replies
    18
    Views
    16,225

    Ah crap. Don't I feel stupid replying to a 4...

    Ah crap. Don't I feel stupid replying to a 4 month old post. Sorry.
  8. Replies
    18
    Views
    16,225

    As Pecosian mention, this looks to be a standard...

    As Pecosian mention, this looks to be a standard assymetric encryption algorithm in the one-way function family:
    "Fy,n(X) =Y^X mod N"

    As most are probably aware, RSA and Diffie Hellman algorithms...
  9. Replies
    11
    Views
    10,717

    nmap MAC discovery?

    Perhaps I missed something, but how does one use NMAP to get MAC addresses remotely (ie when there is a router/layer 3 device between yourself and the scanned target)? If truly possible, that could...
  10. Replies
    12
    Views
    13,532

    netscreen?

    disregard, sorry.
Results 1 to 10 of 10