001_Security

Monitoring modems with OpsMgr 2007

In this short post, I’ll explain one of the techniques to monitor whether a modem is listening for incoming calls on a machine, using Operations Manager 2007. Assuming that you may have some modems that get turned on when someone needs to dial in (for whatever reason), and *should* be disconnected afterwards. So you would […]

Monitoring Juniper/Netscreen firewalls with Ops Mgr 2007 (using snmp and syslog)

As far as I know, there are no free Management Packs available for monitoring Juniper/Netscreen firewalls with Operations Manager 2007. Catching snmp traps and syslog events seems to be the only “easy”/free way to monitor what is going on on your Juniper devices. The following steps will need to be taken : Prepare the OS […]

Setting up InfoExpress CyberArmor Suite 3.5

CyberArmor is a really excellent personal firewall. The CyberArmor suite consists of a Policy Server (and Policy Manager) used to create policies, a CyberServer (used to capture logs and alarms, optional), a Secure Ping Server (optional) and an MSDE back-end. More information can be found at http://www.infoexpress.com/security_products/firewall_overview.php The product runs on Windows platforms and allows […]

Juniper : Setting up an IPSec VPN tunnel between a Juniper Netscreen firewall/vpn device and a Cisco VPN device

Today, I will explain the (easy) steps to set up a route-based IPSec VPN tunnel between a Juniper Netscreen firewall/VPN device and a remote Cisco device (such as Cisco ASA) If you are looking for more generic information on IPSec and building VPNs with Juniper, take a look at my blog post on VPNs with […]

Using Active Directory and IAS based Radius for Netscreen WebAuth authentication

As most of the bigger players in the firewall market, Juniper/Netscreen SreenOS based firewalls allow you to use/enforce/require authentication for various reasons : Admin login Client VPN Authentication to open a specific rule on the firewall In a default configuration, ScreenOS uses a local user account database for all types of authentication listed above. In […]

Performing AD Schema Updates in a safe way

Updating from 2003 to 2003 R2 & implementing Exchange are 2 common administrative tasks which both require a schema update. Since I’ve mentioned “updating from 2003 to 2003 R2”, I’ll take the opportunity to add some “notes from the field” to this blog post, which will increase success rate of the update and limit the […]

Creating and installing lzm modules in Backtrack 2

Today, I will explain how you can create your own lzm modules & patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http://www.remote-exploit.org/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final […]

Running Snort with Dynamic IP on Fedora

One of my Linux boxes has a direct cable connection to the internet. I’ve been using Snort in corporate environments for a long time now, but I never had to configure snort to look at interfaces that have a DHCP assigned IP address and actually use that IP address as its HOME_NET. There’s an easy […]

Corelan Training

We have been teaching our win32 exploit dev classes at various security cons and private companies & organizations since 2011

Check out our schedules page here and sign up for one of our classes now!

Donate

Want to support the Corelan Team community ? Click here to go to our donations page.

Want to donate BTC to Corelan Team?



Your donation will help funding server hosting.

Corelan Team Merchandise

You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.

Protected by Copyscape Web Plagiarism Tool

Corelan on Slack

You can chat with us and our friends on our Slack workspace:

  • Go to our facebook page
  • Browse through the posts and find the invite to Slack
  • Use the invite to access our Slack workspace
  • Categories