Wireless Penetration Testing Checklist – A Detailed Cheat sheet

I found one interesting page for those interested in pentesting and in cybersecurity space. A checklist on toolset you will need to https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/ Credits to Balaji N of gbhackers and Cheers to Priya James for sharing this one. What is wireless Penetration Testing Wireless Penetration testing is the Actively Examine the Process of Information security … Continue reading Wireless Penetration Testing Checklist – A Detailed Cheat sheet

Tricks: 6 handy and simple tools in Network troubleshooting

Sweep Ping. If you want to check all the devices on the LAN Network by doing a sweeping ping to all the IPs in a given /2 subnet. for /L %a in (1,1,254) do @ping -n 1 192.168.1.%a|find "TTL" Just replace the 192.168.1 with your first three octets. 2. DIsplay your machines Routing Table using … Continue reading Tricks: 6 handy and simple tools in Network troubleshooting

Tricks: Cisco VPN on Windows 8.1 or Windows 10 – Reason 442: Failed to enable Virtual Adapter

Problem: Error when connecting to VPN Error Message: Reason 442: Failed to enable Virtual Adapter If you receive this error on Windows 8.1 or Windows 10 while trying to connect with the Cisco VPN Client then the solution is a simple registry fix. To fix: Click Start and type regedit in the Search field and hit enter. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA Find the String … Continue reading Tricks: Cisco VPN on Windows 8.1 or Windows 10 – Reason 442: Failed to enable Virtual Adapter

Tools: Flow Trace in Fortigate

The flow trace feature in the FortiGate units allows you to trace to flow of a packet through the firewall you are consoled to. It allows you to see if the packet is being denied for some reason or being allowed by a particular policy. You can also see what NAT rule and routing is … Continue reading Tools: Flow Trace in Fortigate

Mirai Botnet vs IoT: The “Internet of Things”

Wikipedia defines Internet of Things as: Image by: Wikipedia The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also referred to as "connected devices" and "smart devices"), buildings, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. It's basically any object … Continue reading Mirai Botnet vs IoT: The “Internet of Things”

Eternal Blues – a free EternalBlue vulnerability scanner

So, I came across this new tool that scans for vulnerability on your network against EternalBlue (the exploited tool used as a framework for many, if not most, of the well-known Ransomwares around)  called EternalBlues.exe developed by Elad Erez. Here are some tips from Elad before running the tool: Tips If you’re about to run … Continue reading Eternal Blues – a free EternalBlue vulnerability scanner

Petya, NotPetya Security Recommendations

Prevention To proactively prevent from being attacked by this Petya-family of malware or mitigate the damage: Keep your computer with the latest patch, especially apply Microsoft Windows security update MS17-010. Enable the Windows Firewall to block incoming requests to ports 135, 139, and 445. Disable SMBv1 in Windows https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows. Segment your network into multiple network … Continue reading Petya, NotPetya Security Recommendations