locking down a windows environment
since we did a network overhaul (defined in detail shortly) 2 years ago, we have had zero incidents of malware/virus’/badware on any machines that we know of (i know i will probably walk into bedlam...
View Articleintranet’s and ssl
recently, i was helping set up a sharepoint intranet site that would house several sites, things like a help desk ticket system, a knowledge base, and some org based group pages for collaboration. for...
View Articlesetting up armitage on ubuntu with a postgres db
installing armitage for a metasploit gui on ubuntu with a postgres backend
View Articlepacket logging with iptables
<note> i wasted 2 hours of my life getting this working on a fresh install of unbuntu 10.10. turns out that the default version of rsyslog that you get when you ‘apt-get install rsyslog’ is...
View Articlenetworkminer on backtrack 5 r1
i have recently been working through some network forensic challenges from a few locations (http://forensicscontest.com and http://ismellpackets.com/category/pcap/) and wanted to do some network...
View Articlevlan abuse
this is a quick post about vlan hacking abuse. specifically, this post will cover how to abuse cisco switches and the DTP (dynamic trunking protocol). why is this important? typically, most...
View Articleextreme makeover: network edition
recently i spoke at a conference about a network upgrade i did at a previous job. the upgrade was a very difficult, but rewarding process, and has become one of my favorite topics to speak about....
View Article
More Pages to Explore .....