Well, first, we need to understand what Log4j is. Essentially, Log4j is the logging function that is built-in in Java applications. This current vulnerability is affecting Apache servers; however, I feel that it will spread to a larger domain of targets aside from web servers. On December 9th, the initial vulnerability was discovered, and software […]
Taken From: The Fortinet Cookbook Periodically a situation arises where the FortiGate needs to be accessed or the admin account’s password needs to be changed but no one with the existing password is available. If a physical access to the device is possible and with a few other tools, the password can be reset. Warning: This […]
SSH access is critical when it comes to managing your networking equipment. In this tutorial I will show you how to enable SSH access on the Cisco ASA. Just enter the following commands in a configuration terminal and you will be all set. asa(config)# crypto key generate rsa general-keys modulus 2048 asa(config)# username testuser password […]
If you are like me, you don’t want to deal with the overly bloated interface that Kali presents you with. Though Kali Linux is a great distro altogether, it can become quite cumbersome quickly. If you are a native Linux user, then this should be a godsend for you if you are looking to get […]
Researchers at Google have noticed that the frequency of phishing attacks crafted around 2FA has increased drastically. These new attacks are designed to "re-route" SMS (text message) based authentication codes to the attacker without the victim's knowledge.
Jolin Consulting tries to add value to any consumer or business regardless of affiliation. Our goal is to empower everyone to embrace technology however, this task can be extremely cumbersome.
A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules. A network-based firewall inspects traffic as it flows between networks. For example, you can install a network-based firewall on the edge of your private network that connects to the Internet to protect against […]
A Virtual Private Network (VPN) is a remote access connection that uses encryption to securely send data over an untrusted network. By using a VPN you can take advantage of an existing Internet connection to securely communicate between devices. A VPN provides an alternative to: WAN connections. Connections using telephone lines and a remote access server. VPNs […]
The following table lists common attacks that are perpetrated against switches. Attack Description MAC flooding MAC flooding overloads the switch’s MAC forwarding table to make the switch function like a hub. MAC flooding is performed by the following method: The attacker floods the switch with packets, each containing different source MAC addresses. The flood of packets fills up […]
IP Security (IPSec) provides secure data transmission over unprotected TCP/IP networks such as the Internet. IPSec operates on OSI layer 3, the network layer. It provides mutual authentication, integrity, nonrepudiation and confidentiality. IPSec includes two protocols: Protocol Function Authentication Header (AH) AH provides authenticity, non-repudiation, and integrity. AH: Does not provide confidentiality because the data in the packet […]