October 19, 2018

Category: Security

Cisco :: How to Reimage 5500-X Firewalls to FTD

In this article, we will take a look at how to reimage the Cisco 5500-X series firewalls to Firepower Threat Defense (FTD). This article assumes that the reader is already familiar with ASA’s and Firepower, however, I will list some prerequisites below. Prerequisites Access to software.cisco.com to download the required imagesConsole access and access to a […]

Cisco :: Configuring Site-to-Site VPN’s on ASA Firewalls

In this video session, I cover how to configure L2L VPN’s on Cisco ASA Firewalls.  I have included the presentation from the video along with the essential configurations used to create a L2L VPN. Configuring Site-to-Site VPN's on ASA Firewalls from Kelvin Charles Configuration Used ***ASAv1*** ASA Version 9.8(3) ! hostname ASAv1 ! interface GigabitEthernet0/0 […]

PowerShell :: Parsing text output

I came across a really great way of parsing output from command line tools within PowerShell so had to right a quick blog about it here to share it.  Normally I like to cite my sources but I’ve lost track of the original stack overflow post that led me to this point… Sorry! This technique […]

Learning :: What is a DMZ?

In this video, I discuss what a DMZ is and how they’re typically deployed from an architecture perspective. We also take a look at how to configure a basic DMZ using a Cisco ASA firewall. What is a DMZ? from Kelvin Charles

Cisco :: Manually Add SSH Public Key’s to FXOS Devices

Background In this article, I want to cover the process of adding SSH host key’s to the FXOS chassis’. This process doesn’t seem to be widely documented hence the reason for wanting to capture and share the process. When configuring SSH on a Firepower chassis, you’re given the ability to configure strict host key checking. […]

Common Firewall Issues

One thing I come across time and time again are poorly configured firewalls. The reason for this is largely down to the people who configure them. Companies often put all their eggs in one basket when it comes to IT services which means people who perhaps aren’t best suited to managing security products, end up […]

Cisco :: How to Upgrade an ASA 5506-X

In this video, we take a look at how to upgrade a Cisco ASA 5506-X. Please like, share, comment. Useful Links: Website: www.synack.co.uk Twitter: @iwiizkiid Instagram: @iwiizkiid Please also refer to the Cisco upgrade guide: https://www.cisco.com/c/en/us/support/security/asa-5506-x-firepower-services/model.html#InstallandUpgradeGuides

Cisco ISE :: Upgrading ISE from 2.x to 2.4

In this video demonstration, we take a look at the process involved for upgrading ISE nodes from versions 2.x to the current latest release of 2.4.  

Docker :: Tips and tricks

This post will be ever evolving as I find more tips and tricks for working with Docker on Windows.  Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]

Tenable Nessus, where has my API gone?

Nessus Professional (Pro) is undoubtably one of the cyber security consultants favourite tools. It has also been a widely adopted tool for organisations on a budget  looking to start out in the never ending world of vulnerability management. It’s humble beginning starting out as a fully open source tool, to the favourably priced commercial  entity we see […]
Page 1 of 812345 » ...Last »

Subscribe to SYNACK via Email