2 min
Automation and Orchestration
How to Configure ModEvasive with Apache on Ubuntu Linux
Synopsis
Mod_evasive is an Apache module that can be used to protect against various
kinds of attacks on the Apache web server including DDoS, DoS and brute force.
Mod_evasive provide evasive action in the event of attacks and reports malicious
activity via email and syslog. It works by inspecting incoming traffic to an
apache web server using a dynamic hash table of IP addresses and URLs, then
blocks traffic from IP addresses that exceed a predetermined threshold.
Here, we will going to explai
4 min
IT Ops
Network Administrator’s Guide to Surviving an Audit: Preparation
Sooner or later, your organization will likely be the subject of an IT audit.
But as ominous as that sounds, it doesn’t have to be something to dread. If
you’re a network administrator, you’ll have a specific role in an audit. Since
audits are rarely small projects, you’ll likely be working with others
throughout the process. The best way to fulfill your specific role well is to be
prepared for an audit before it happens. Simply put, an audit is an examination
to determine if controls are suff
1 min
Microsoft
Cisco Enable / Privileged Exec Support
In Nexpose version 6.4.28, we are
adding support for privileged elevation on Cisco devices through enable command
for those that are running SSH version 2.
A fully privileged policy scan provides more accurate information on the
target's compliance status, and the ability to do so through enable password,
while keeping the actual user privilege low, adds an additional layer of
security for your devices. This allows our users to run fully privileged po
2 min
Top 3 Reasons to Get Started with Content Security Policy
Content Security Policy (CSP) was proposed to assist the browser in determining
what elements are approved, both in the page and loaded via reference to 3rd
party sites. For example, one of the web’s most common vulnerabilities is
Cross-Site Scripting (XSS).
Its prevalence is helped most by the extremely trusting and flexible way
browsers execute HTML & JavaScript and the common case of displaying
user-supplied input back to the user. CSP is an HTTP response header that
instructs browsers what
2 min
Endpoint Security
Addressing the issue of misguided security spending
It's the $64,000 question in security – both figuratively and literally: where
do you spend your money? Some people vote, at least initially, for risk
assessment. Some for technology acquisition. Others for ongoing operations.
Smart security leaders will cover all the above and more. It's interesting
though – according to a recent study titled the 2017 Thales Data Threat Report
10 min
Komand
Investigating Our Technology — Internet of Things or Internet of Threats?
One cold winter afternoon as I sat in my office, cursing the air several degrees
warmer around me due to slow internet connectivity, I thought to take a look at
exactly the issue was. I had recently installed a new system of wireless access
points which should be blanketing the entire house with a strong enough signal
to make the air glow well out into the yard.
I logged into the controller for the APs, which helpfully provided all manner of
statistics regarding the different devices connected,
6 min
Vulnerability Disclosure
R7-2016-28: Multiple Eview EV-07S GPS Tracker Vulnerabilities
Seven issues were identified with the Eview EV-07S GPS tracker, which can allow
an unauthenticated attacker to identify deployed devices, remotely reset
devices, learn GPS location data, and modify GPS data. Those issues are briefly
summarized on the table below.
These issues were discovered by Deral Heiland of Rapid7, Inc., and this advisory
was prepared in accordance with Rapid7's disclosure policy.
Vulnerability DescriptionR7 IDCVEExploit VectorUnauthenticated remote factory
resetR7-2016-28
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/24/17
Faster, Meterpreter, KILL! KILL!
You can now search for and kill processes by name in Meterpreter with the new
pgrep and pkill commands. They both have flags similar to the older ps command,
allowing you to filter by architecture (-a), user (-u), or to show only child
processes of the current session's process (-c). We've also added a -x flag to
find processes with an exact match instead of a regex, if you're into that.
Fun with radiation
Craig Smith has been killing it lately with all his h
6 min
CIS Controls
The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege
The ultimate goal of an information security program
is to reduce
risk. Often, hidden risks run amok in organizations that just aren't thinking
about risk in the right way. Control 4 of the CIS Critical Security Controls
can be contentious,
can cause bad feelings, and is sometimes hated by system administrators and
users alike. It is, however, one of the controls that can h
3 min
Metasploit
Exploiting Macros via Email with Metasploit Pro Social Engineering
Currently, phishing is seen as one of the largest infiltration points for
businesses around the globe, but there is more to social engineering than just
phishing. Attackers may use email and USB keys to deliver malicious files to
users in the hopes of gaining access to an organization's network. Users that
are likely unaware that unsolicited files, such as a Microsoft Word document
with a macro, may be malicious and can be a major risk to an organization.
Metasploit Pro
4 min
Penetration Testing
Combining Responder and PsExec for Internal Penetration Tests
By Emilie St-Pierre, TJ Byrom, and Eric Sun
Ask any pen tester what their top five penetration testing tools
are for internal
engagements, and you will likely get a reply containing nmap, Metasploit,
CrackMapExec, SMBRelay and Responder.
An essential tool for any whitehat, Responder is a Python script that listens
for Link-Local Multicast Name Resolution (LLMNR), Netbios Name Service (NBT-NS)
and Multicast Domain Name System (mDNS)
5 min
Komand
Malware Incident Response Steps on Windows, and Determining If the Threat Is Truly Gone
Malware can be a sneaky little beast. Once it's on your computer or network, it
may be hard to detect unless you're explicitly looking for it. When dealing with
malware, it is extremely important to not only know the signs to look for, but
also how to stop malware in a timely manner to reduce the spread of infection in
the event that it's detected.
Malware can spread pretty quickly, especially in a corporate environment where
company-wide email is used as the primary method of communication and
4 min
Metasploit
Metasploit's RF Transceiver Capabilities
The rise of the Internet of Things
We spend a lot of time monitoring our corporate networks. We have many tools to
detect strange behaviors. We scan for vulnerabilities. We measure our exposure
constantly. However, we often fail to recognize the small (and sometimes big)
Internet of Things (IoT) devices that are all around our network, employees, and
employees' homes. Somewhat alarmingly – considering their pervasiveness — these
devices aren't always the easiest to test.
Though often difficult,
4 min
Automation and Orchestration
Cybersecurity exercises – benefits and practical aspects (part 2 of 2)
Synopsis
In the series of articles titled “Incident Response Life Cycle in NIST and ISO
standards” I reviewed incident response life cycle
defined and described in NIST Special Publication (SP) 800-61 – Computer
Security Incident Handling Guide.
Before I move on to discuss ISO/IEC 27035 standard, I believe it is interesting
to discuss shortly how cybersecurity exercises can help prepare to handle
incidents.
Cybersec
4 min
Automation and Orchestration
Cybersecurity exercises – benefits and practical aspects (part 1 of 2)
Synopsis
In the series of articles titled “Incident Response Life Cycle in NIST and ISO
standards” I reviewed incident response life cycle
defined and described in NIST Special Publication (SP) 800-61 – Computer
Security Incident Handling Guide.
Before I move on to discuss ISO/IEC 27035 standard, I believe it is interesting
to discuss shortly how cybersecurity exercises can help prepare to handle
incidents.
Cybersec