Blog Posts Tagged with "TCP"

D8853ae281be8cfdfa18ab73608e8c3f

Let Me Out of Your .NET Work: Intro

September 05, 2012 Added by:Rob Fuller

The problem I find with these tools is that they are still straight TCP. I know most networks still allow some ports directly outbound and these tools are still quite valid. During the span between these two tools being released, MrB released a site that listens on all 65k ports...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Netstat Post Module for Meterpreter

July 20, 2012 Added by:Rob Fuller

It's real simple, first we've gotta add the GetTcpTable function to Railgun, then gauge the size of the table, then it's all just parsing the result. Also pretty straight forward. First we get the number of entries which is held in the first 4 bytes, then just parse the MIB_TCPTABLE one MIB_TCPROW...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Three Areas to Test when Assessing Mobile Applications

May 02, 2012 Added by:Tom Eston

Mobile Application testing is something that will evolve as mobile apps get more complex and the business drives more towards mobile solutions. If you’re deploying mobile apps for your business it’s more important than ever to have testing done on three areas at a minimum....

Comments  (1)

1de705dde1cf97450678321cd77853d9

A Tribute to Our Oldest and Dearest Friend - The Firewall

April 22, 2012 Added by:Ian Tibble

We have a lot of bleeding edge software and hardware products in security backed by fierce marketing engines which set unrealistic expectations. Out of all these products, the oldest carries the highest bang for our bucks - the firewall...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain Three: Telecoms and Network Security

March 19, 2012 Added by:Javvad Malik

Network security is so important yet because it’s complex, a lot of companies end up doing it wrong. Not as many people properly understand the security implications of the network and most companies don’t even know what their network is comprised of...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: GE Intelligent Platforms Proficy Plant Vulnerability

March 14, 2012 Added by:Infosec Island Admin

ICS-CERT received a report concerning multiple memory corruption vulnerabilities in the GE Intelligent Platforms Proficy Plant Applications which could allow an attacker to cause multiple Proficy services to crash, which may lead to arbitrary code execution...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

When a Tool Becomes a Weapon

February 01, 2012 Added by:Alan Woodward

The Metasploit Project is an extremely valuable tool. However, a recent development which was revealed demonstrates just how easily the Metasploit Framework can be used to develop malicious payloads that avoid detection by the usual Anti-Virus and Firewall software...

Comments  (1)

A88973e7d0943d295c99820ab9aeed27

VoIP: The Danger of Open Ports

January 25, 2012 Added by:Simon Heron

The Sipera UC-Sec 100 device is designed to withstand such attacks but many IP-PBX’s are not. If these attacks had been launched against an undefended and vulnerable system, it would have been possible for the hacker to register as an authorized user of the system...

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Getting Smacked in the Face Over TCP

November 21, 2011 Added by:Robin Jackson

Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...

Comments  (0)

C6dd57cb9806eadc9f7915a90d91aa92

Forensics for Network, Internet, and Cloud Computing

September 06, 2011 Added by:Tony Campbell

A number of chapters had a very long and complete reference section, while a few chapters had no reference section at all, yet it was obvious that they required a reference section. And poor screenshots and lack of references seems like laziness on behalf of the author and publisher...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Red Hat 5 STIG: Network Settings

August 23, 2011 Added by:Jamie Adams

I would caution administrators from rushing to add all because most are defaults. The settings must be implicitly set in the sysctl.conf config file. My recommendation is to review the entire STIG in order to define a complete sysctl.conf file, so that it can be deployed and tested all at once...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part II

July 19, 2011 Added by:Dawn Hopper

The value of the normalizer with inline mode cannot be overstated; it can reassemble entire fragmented streams as well as modify packets with illegal and/or malformed options before they reach their target. Not surprisingly, some technical documents refer to this function as packet scrubbing...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part I

July 07, 2011 Added by:Dawn Hopper

This first part of a two-part series will deal with Application Inspection and Control, sometimes referred to as DPI or Deep Packet Inspection. Rather than give detailed commands, this will serve as a high-level comparison...

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

Advanced Evasion Techniques

June 16, 2011 Added by:Rod MacPherson

Evasion techniques are not attacks on their own, but rather a sneaky way to get whatever attack you want to use past the network monitoring and policing systems to the target host. It's not about the bad-guy asking "How can I hack in?", but "How can I hack in without being seen?"

Comments  (0)

F520f65cba281c31e29c857faa651872

WAN Optimization and Catalysts for Cloud Deployment

May 20, 2011 Added by:Rahul Neel Mani

Amazon needs to spend time with IT professionals and put in place the right processes, hence, minimizing the risks. They also have to put in place new data centers and improve redundancy for risk management. Risks have to be covered...

Comments  (0)

Page « < 1 - 2 > »