News
Wireless DOS attacks
While the Security of Wireless networks are improving, they are still very susceptible to DOS attacks and I doubt that will change anytime in the near future. RF jamming and
RFC 791 Exploit
An attacker is attempting to Telnet a specific host secured behind a firewall rule tht only allows inbound connections on TCP port 25. Send 2 packets, the first packet with
two important guidelines to follow when implementing VTP
All switches in the VTP domain must run the same version of vtp. Enabling VTP pruning on a server will enable the feature fro the entire management domain.
ASA/PIX load-balance
ASA/PIX Active/Active failover can be used to load-balance, On a per-context basis only.
Classifier
Fig1 represents 3 security contexts all sharing a common VLAN(500) a single IP subnet corresponds to that VLAN. This is equivalent to connecting three security appliances using an ethernet switch.
MD5 authentication is added to an OSPF virtual link
To increase security, MD5 authentication is added to an OSPF virtual link Company security policies dictate that all passwords must be changed after 90 days. If a second MD5 key
Continue reading…MD5 authentication is added to an OSPF virtual link
Access methods of the CS-Mars
Telnet and SSH are access methods the CS-Mars can use to get configuration information from an Adaptive Security Appliance (ASA).
Anomly Detection
Anomly Detection is an example of a security technlogy that could be enabled by Netflow
PIX version 7.0 features
rate-Limiting support for multiple virtual firewalls Transparent firewall
RADIUS vendor Specific Attribute
The RADIUS Vendor Specific Attribute type is decimal 26. Vendor Specific Attribute MUST include the Legend field. In Cisco’s vendor Specific attribute implementation, vendr-ID of 1 is commonly reffered to
NAC framework ACS server
The ACS server used in the NAC framework, to authenticate devices based on quarantine information
Algorithms TKIP added to the 802.11 specification:
Algorithms TKIP added to the 802.11 specification: Key Mixing Anti-replay sequnce counter Message integrity check
TCP session hijack
would an attacker figure out the initial sequence number: 1) Attacker sends SYN packet to server using a spoofed source IP address ot a trusted host 2)Server sens SYN, ACK
GRE header
The size of a point-to-point GRE header 4 bytes, and protocol number 47 at IP layer
MPPE encryption Not required for PPTP
MPPE encryption Not required for PPTP
IOS easy VPN
the IOS easy VPN server config: To connect the remote VPN client will use a groupname of test The remote vpn client will be assigned an internal IP address from
emb_lim
Using the emb_lim option in the static command, is one way to configure the security appliance to protect against DoS attacks
ACL AS-Path
IP as-path access-list 1 deny_65104$ IP as-path access-list 1 permit AS-Path ACL is used to deny all the prefixes that originate in AS 65104 and permit all other prefixe