Thursday, November 27, 2014

Whether to enable "System Cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing"

Use of "System Cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing"is the standard recommendation in order to align with many security compliance standards. The United States Federal Information Processing Standard (FIPS) standard defines cryptographic algorithms approved...

Thursday, October 9, 2014

Configure wvdial.conf in Ubuntu 14.04

I wanted to configure my Etisalat broadband connection with Ubuntu 14.04. Network Manager has already been uninstalled. In order to connect to the broadband network, I followed the below listed proceedure. Wvdial, the software I used to connect, is  an  intelligent  PPP  dialer,...

Configure Wireless Network: Edit /etc/network/interfeces of Ubuntu 14.04

To discover the available wireless interfaces $sudo lspci |grep Wireless$sudo lspci |grep Network To discover the available wireless networks $sudo iwlist wlan0 scan To ask the wireless interface to associate with an identified access point $sudo iwconfig wlan0 essid If there is an encryption to...

Monday, August 11, 2014

Firewalking with nmap

Firewalking is a technique developed by Mike Schiffman and David Goldsmith that utilizes traceroute techniques and TTL values to analyze IP packet responses in order to determine gateway ACL (Access Control List) filters and map networks. It is an active reconnaissance network security analysis technique...

Tuesday, July 29, 2014

Install and Use Nmap/Zenmap 6 in Ubuntu 14.04

For the installation, you follow the steps listed below. If you don't have the alien command, install it with a command such as $sudo apt-get install alien Download the Nmap RPMs for your platform (x86 or x86-64) from http://nmap.org/dist/nmap-6.46-1.i386.rpm or from http://nmap.org/dist/nmap-6.46-1.x86_64.rpm...

Tuesday, June 17, 2014

Forcing Password Complexity in Red Hat Linux

My requirement was to enforce the password complexity for all the users of my RHEL 5 server (This will works for RHEL 4/5 also). This would be helpful to you also.Password complexity is a set of rules which define what set of characters and how many of each characters must be in a password. My policy...

Blocking intrusion attempts using authentication module pam_tally2

It is possible to block these intrusions using the authentication module called "pam_tally2". This module maintains a count of attempted accesses, can reset count on success, can deny access if too many attempts fail. By default, pam_tally2 module is already installed on the most of the Linux distributions...

Monday, June 16, 2014

How to Disable Directory Listings in IIS/Apache

The easiest way to disable directory listing is to create an index file. The name of the index file depends on the web server configuration. On Apache is called index.htm, index.html. On IIS is named default.asp, default.aspx, default.htm. On IIS directory listings are disabled by default. For Apache...

Tuesday, June 3, 2014

DoS-ing & Countering Apache Web Link Saturation

Testing your webserver - DoS-ing DoS, or Denial of Service attacks, are nothing new.  The main idea behind a DoS attack is to exhaust a devices resources (be it HTTP, some database backend, or any other form of  ‘service’) until it can’t respond to legitimate requests anymore. The most popular...

Wednesday, February 12, 2014

Network Time Protocol(NTP) Based DDoS Attacks.

Accurate, reliable time is necessary for financial and legal transactions, transportation and distribution systemsand many other applications involving widely distributed resources. Network Time Protocol (NTP) is a protocol for synchronizing a set of network clocks using a set of distributed clients...