What’s a good appreciation gift for a team member who cracks the case? Today a network admin in our IT team caught an ancient sftp server being abused and shut it down. I’m thinking a 6 pack of craft beer.
What has your team done for people who go above and beyond in finding and stopping incidents?
Ten post głównie zainteresuje adminów linuksowych, ale inni użytkownicy Linuksa także będą zadowoleni.
Wczoraj odkryłem ciekawy program, którego szukałem od lat :). Mowa o programie #termshark. Z wyglądu i funkcjonalności przypomina program na desktopa o nazwie #Wireshark.
Z opisu wynika, że obsługuje także inne platformy:
This tool is used to spoof DHCP servers. It sends fake DHCP offers to a specific network interface and manipulates the IP addresses of network devices.
Цікаво, що деякі з цих IP-адрес мають шкідливі індикатори і б'ються по VirusTotal... Де гарантія того, що через них не пролізе бекдор...? Ми, звичайно, відфільтруємо подібні з'єднання фаєрволом і зашифруємось vpn'ом. А звичайний користувач? У нього усі "брами" відкриті по дефолту...
A sneaky way of hiding a bunch of devices behind a single IP, making it impossible to identify who's responsible for what! Because of this, miscreants have access to a whole pool of IPs enabling spamming and other malicious activities....... and the worst part is, many users don't even know 😨
📢 Internet service providers - learn more about this issue and what you can do to protect your users:
We’ll be sharing best practices for bolstering cyber defense at MilCIS 2023 in Canberra, Australia this week! Stop by to meet with our @corelight booth F01 to learn how to use your network to reveal even the stealthiest of foreign adversaries and stop them in their tracks. https://www.milcis.com.au/about/milcis
I pulled the trigger and jumped from (yet another) instance to this one. This seems like a cozy little part of the fedi. Here is an update introduction for all you cuties 💖
I am a #CS researcher in the midwest US. I mainly work in #NetworkSecurity and #BinaryAnalysis, particularly as they relate to critical #Infrastructure. My current project deals with re-hosting and analyzing cellular baseband processor binaries.
I also sometimes work as a contractor with a DOE lab working on critical infrastructure security.
When I can escape work, I like #diy stuff, #sustainability #Free / #Libre Software, #ElectronicMusic, #Metal, #scifi, #fantasy, #anime, and #ttrpgs. My current obsession is BattleTech and I am reading the #SailorMoon manga. When the weather cooperates I like to go inline skating.
I'm an #enby #transfem :BlobhajTransPrideHeart: and #bisexual.
I'm excited to be here and am looking forward to making some new connections around here 💖
I'm about to move a few parts of my network off-site. Anyone have any input for getting LDAP-based authentication to work across locations?
Like, LDAP+TLS with mutual certificate authentication is just fine, but I don't like the idea of exposing an LDAP port. Though a firewall rule to only allow the other side's IP to access it would probably be okay.
Given that this side still needs to access some internal services, it also makes sense just to #WireGuard it or something, that gives me everything in a manner that I believe is secure, I've yet to hear of any breaks on its encryption... just that if the remote host is compromised I have quite a wide open attack surface.