bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: November 2005
http://bloodsweatinfosec.blogspot.com/2005_11_01_archive.html
Blood, Sweat, and Information Security. Monday, November 07, 2005. Router brute force authentication program. I've written a perl script to perform a brute force login to network devices. It is mainly designed for use with Cisco routers, but works with other devices as well. I wrote it because I had a very difficult time getting Hydra. You can download a tarball of this script from:. Http:/ pages.sbcglobal.net/vleveque/brute-routers.tgz. Just type ./brute-routers -h for the help text. Generic attack meth...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: December 2005
http://bloodsweatinfosec.blogspot.com/2005_12_01_archive.html
Blood, Sweat, and Information Security. Thursday, December 29, 2005. Emerging Challenges in Information Security. I’m updating a client’s information strategy document. This requires that I identify emerging challenges in information security. This involves some prognostication regarding trends in the near future, and concise summaries of selected infosec pundits. Here are some topics I’ve found:. Information Security and Physical Security Convergence. Integrated Security Management Systems. The cost and...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: May 2006
http://bloodsweatinfosec.blogspot.com/2006_05_01_archive.html
Blood, Sweat, and Information Security. Friday, May 12, 2006. Layer 1 Security Conference, April 15, 2006. The hacker community holds periodic conferences or cons to share tricks and techniques, impart practical and theoretical knowledge, socialize, drink, and have a good time. The big, well-known cons include Defcon. Las Vegas), HOPE. New York City) and the European Chaos Computer Club (Berlin). Local and regional events are held on a smaller scale. Ken Caruso Seattle Wireless 6 years later. Use of a No...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: August 2005
http://bloodsweatinfosec.blogspot.com/2005_08_01_archive.html
Blood, Sweat, and Information Security. Monday, August 22, 2005. Scanning tools help build a network inventory. I was able to use some hacker tools legitimately, for purposes of developing a device inventory in a large distributed network. The point of the exercise was to figure out which IP addresses were live, and then to identify these live devices. The utility nmap was used for the initial scan. Two consecutive scans were performed, the first a ping scan:. Then a so-called TCP ping scan:. A more prec...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: April 2006
http://bloodsweatinfosec.blogspot.com/2006_04_01_archive.html
Blood, Sweat, and Information Security. Wednesday, April 19, 2006. Converging facility and information security. Convergence in this case refers to a coming together of physical and information security practices within organizations. This coming together is being driven by two trends: increasingly sophisticated network-based management of facility infrastructure and the increasing importance and sophistication of physical attacks against IT infrastructure. This merger is a difficult one, as faci...Infor...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: May 2005
http://bloodsweatinfosec.blogspot.com/2005_05_01_archive.html
Blood, Sweat, and Information Security. Saturday, May 14, 2005. Greetings, Blog World! I'm Vincent LeVeque, an information security consultant. I'm currently on assignment with a large local government entity. I do general network management stuff in addition to security tasks. I'm currently developing some security hardening documents for several operating environments: IBM AIX, Red Hat Enterprise Linux, Apache (Unix and Windows versions), and Windows 2000/2003 Server. Ensure that it is possible to audi...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: July 2005
http://bloodsweatinfosec.blogspot.com/2005_07_01_archive.html
Blood, Sweat, and Information Security. Sunday, July 17, 2005. Environmental devices provide several options for this monitoring. The building management industry has evolved communication schemes for monitoring and management independent of mainstream network management practices. These include ModBus and BACnet. ModBus is based on an underlying multipoint master/slave serial protocol (see http:/ www.modbus.org/default.htm. BACNet also supports BACNet over IP (see http:/ www.bacnet.org/. Vendor snmp imp...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: June 2006
http://bloodsweatinfosec.blogspot.com/2006_06_01_archive.html
Blood, Sweat, and Information Security. Wednesday, June 28, 2006. VoIP Security and Technology Maturity. Traditional telephony services, using Private Branch Exchange (PBX) systems and dedicated wiring are being supplanted by provision of telephony services over existing IP-based networks. Referred to as Voice over IP (VoIP), these services provide cost savings by using the same cable plant for both voice traffic and data traffic, and by permitting calls to be routed over lower cost IP networks. VoIP sec...
bloodsweatinfosec.blogspot.com
Blood, Sweat, and Information Security: October 2005
http://bloodsweatinfosec.blogspot.com/2005_10_01_archive.html
Blood, Sweat, and Information Security. Saturday, October 22, 2005. Banks to require 2-factor authentication. By the end of 2006, the FFIEC will require banks to adopt 2-factor authentication for Internet customers. Quoting from the article:. BOSTON - Federal regulators will require banks to strengthen security for Internet customers through authentication that goes beyond mere user names and passwords, which have become too easy for criminals to exploit. See this yahoo news story. Also the FFIEC report.