Category Archives: Security
Open Source Intelligence: Resources for Searching and Analysing Online Information
After some complaints about the release of the sixth edition with little or no notice, I received a number of strong recommendations so purchased the book. It is mostly reference material, I will updating this posting once I delve more … Continue reading
OpenVPN 2.2.x and iOS 9.3.x – No routing over the VPN
Whilst going through the process of renewing certificates, and the recent updates for OpenVPN and iOS, I discovered that traffic was no longer being routed over the tunnel. There are a number of postings blaming changes that Apple have made … Continue reading
Multiple VPN’s on SRX using Loopbacks
For anyone who has tried to configure a Juniper SRX and source VPN’s using a loopback (as you do with Cisco) will have run into a problem. Only one loopback is permitted per VRF (or Routing-Instance). You can assign multiple … Continue reading
SSH Escape Commands
These are the ssh escape commands from within an ssh connected session. %~? Supported escape sequences: ~. – terminate connection (and any multiplexed sessions) ~B – send a BREAK to the remote system ~C – open a command line ~R – Request rekey (SSH protocol … Continue reading
Cisco Multiple SSID assigned to VLAN
Armed with a Cisco 877W or an AironetAP it would be good to have multiple SSID’s assigned to their own VLAN’s with their own WPA passwords. The only restriction is that only one SSID can broadcast it’s name (guest-mode). In … Continue reading
Creating a Thawte CSR and then Installing the SSL Certificate on Cisco IOS
This brief note covers getting an SSL certificate registered with Thawte onto a Cisco router running IOS. 1. Create the Trustpoint This binds the SSL cert to the CA (Certificate Authority) which in this case is Thawte. The subject is … Continue reading
Using SFTP on a non-standard port
It makes good security sense to change the ssh port on servers that are Internet accessable. To take advantage of this using ssh is quite straight forward as their is a parameter -p to support this eg: ssh -p 3432 mick@mickvaites.com Unfortunately … Continue reading
Web Tunnelling over SSH
Not new information but all the same useful for either secure traffic or bypassing web cache restrictions. First example is a socks proxy to allow you to secure web traffic over a wifi link or just avoiding web caching filters. … Continue reading
Man in the Middle – ARP Poisoning on OSX
At the core of all investigation in relation to a networks is the need to sniff packets. If you have a switch with SPAN port capabilities then you can listen in from where ever you wish. However if for whatever … Continue reading