August 21, 2018

Category: Security

Common Firewall Issues

One thing I come across time and time again are poorly configured firewalls. The reason for this is largely down to the people who configure them. Companies often put all their eggs in one basket when it comes to IT services which means people who perhaps aren’t best suited to managing security products, end up […]

Cisco :: How to Upgrade an ASA 5506-X

In this video, we take a look at how to upgrade a Cisco ASA 5506-X. Please like, share, comment. Useful Links: Website: www.synack.co.uk Twitter: @iwiizkiid Instagram: @iwiizkiid Please also refer to the Cisco upgrade guide: https://www.cisco.com/c/en/us/support/security/asa-5506-x-firepower-services/model.html#InstallandUpgradeGuides

Cisco ISE :: Upgrading ISE from 2.x to 2.4

In this video demonstration, we take a look at the process involved for upgrading ISE nodes from versions 2.x to the current latest release of 2.4.  

Docker :: Tips and tricks

This post will be ever evolving as I find more tips and tricks for working with Docker on Windows.  Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]

Tenable Nessus, where has my API gone?

Nessus Professional (Pro) is undoubtably one of the cyber security consultants favourite tools. It has also been a widely adopted tool for organisations on a budget  looking to start out in the never ending world of vulnerability management. It’s humble beginning starting out as a fully open source tool, to the favourably priced commercial  entity we see […]

KT Labs EP5 :: ACS to ISE Migration

In the video, I show you how you can leverage the ACS to ISE migration tool to migrate objects from ACS to ISE. As mentioned in the video, a few prerequisites need to be met, these are listed below. Prerequisites Direct connectivity to both the ACS and ISE platforms The correct version of ACS (see […]

Cisco ISE :: Adding Traditional Licenses

In this video, I demonstrate how to add traditional licenses to Cisco ISE. Note: This lab video uses Cisco ISE 2.3

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]

DNS Sinkhole – What is it & Why do I need one?

In this post I will talk about DNS Sinkholing, what it is and how it can help you identify potentially infected machines. Useful in the fight against malware such as viruses, Ransomware and Crypto Jacking! What is DNS? Domain Name System – in very basic terms, the internet (and local networks) are all routed by […]
Page 1 of 712345 » ...Last »

Subscribe to SYNACK via Email