Archive

Archive for the ‘Security’ Category

Testing SMTP using Telnet

January 2nd, 2014 No comments

This is the syntax to use to test SMTP relays. Commands are in bold:

telnet x.x.x.x 25
HELO mydomain.com
250 mobile.yourdomain.com Hello mydomain.com ([129.0.52.74]), pleased to meet you Read more…

Categories: Security Tags:

Simple Bash Script to Backup Netscreen ISG / SSG Firewall

November 7th, 2013 No comments

This script is a simple, interactive way to backup and date-stamp your juniper Netscreen ISG/SSG (ScreenOS) firewall configurations. The script copies the configurations from the firewall using scp. Configurations older than one day ( -mtime +1) are archived off to a bz2 compressed file.  Archives older than 60 days ( -mtime +60 ) are removed from the disk.

The usage is: nsb.sh [ip address / hostname of Netscreen].  (VIEW SCRIPT)

Read more…

Cisco ASA – Comparison of NAT Configuration Scenarios

October 18th, 2013 No comments

This aide-memoir describes and compares NAT configuration (Identity NAT, NAT Exemption/Identity NAT and also compares the syntax between ASA version 8.4.2 and below.  There are some considerable differences to the syntax and some of the better-known commands have been deprecated. Read more…

Categories: CISCO, Network Design, Security Tags: , ,

Deobfuscating Cisco Type 7 Passwords

October 17th, 2013 2 comments

It should be noted that many algorithms require the Cisco IOS to have access to the cleartext password.

The Vigenere algorithm is used to obfuscate the passwords (not really encrypt them as there is no encryption key) in order to prevent “shoulder surfing” from exposing passwords to someone who briefly looks at a running configuration.

500_lines80

If, however, someone gets hold of the configuration they can easily retrieve the passwords using the reverse translation of the Vigenere algorithm.

  • This can be done using various “type-7” password crackers or indeed within the IOS itself
  • Cisco IOS uses this level-7 encryption when the “service password-encryption” command is used. Here is a Perl Script which deobfuscates the Cisco Viginere password Read more…
Categories: CISCO, Security Tags:

Running Snoop on Netscreen Firewall

September 26th, 2013 No comments

An aide-memoir:

ScreenOS-> undebug all
ScreenOS-> clear db Read more…

Categories: Juniper, linux, Security Tags: ,

Juniper ScreenOS – Troubleshooting using Debug Flow

June 21st, 2013 No comments

Debug flow basic
shows the flow of traffic through the firewall, allowing for troubleshooting route selection, policy selection, any address translation and whether the packet is received or dropped by the firewall. Read more…

Cisco ASA – Initial Configuration

March 9th, 2013 No comments

This post describes the tasks required for a basic configuration of the Cisco ASA.  Please note that he smaller Cisco ASA 5505 has an 8-port 10/100 switch which operates at Layer 2 only. So you can not configure the physical ports as Layer 3 routed ports, you need to create VLAN interfaces. By default, interface Ethernet0/0 is assigned to VLAN 2 and it’s the outside (internet-facing or untrusted)interface.  The remaining seven interfaces (Ethernet0/1 to 0/7) are assigned to VLAN 1 Read more…

Categories: CISCO, Security Tags:

OpenSSL – Generate CSR and Test Signed x.509 Certificate

August 28th, 2012 No comments

Another personal aide-memoir for SSL testing:
This method uses OpenSSL to create public/private keys pair and submit the public key to a Certificate Signing Authority to be signed by that CA. The procedure uses various methods to test certificates and SSL connections to web servers: Read more…

Categories: Security Tags: ,

Asterisk Security Threats and Best Practices

December 28th, 2011 No comments

Attacks on Asterisk-based telephony systems are not uncommon. This video explains how to mitigate some attack vectors:
Read more…

Categories: Security, Voice over IP Tags:

DISA UNIX STIG Checklist

December 20th, 2011 No comments

Another Aide memoir:

UNIX SECURITY TECHNICAL IMPLEMENTATION GUIDE
Version 5, Release 1

Can be downloaded from: http://iase.disa.mil/stigs/downloads/pdf/unix-stig-v5r1.pdf

Categories: Computer Architecture, Security Tags: