001_Security

Monitoring Juniper/Netscreen firewalls with Ops Mgr 2007 (using snmp and syslog)

As far as I know, there are no free Management Packs available for monitoring Juniper/Netscreen firewalls with Operations Manager 2007. Catching snmp traps and syslog events seems to be the only “easy”/free way to monitor what is going on on your Juniper devices. The following steps will need to be taken : Prepare the OS […]

Setting up InfoExpress CyberArmor Suite 3.5

CyberArmor is a really excellent personal firewall. The CyberArmor suite consists of a Policy Server (and Policy Manager) used to create policies, a CyberServer (used to capture logs and alarms, optional), a Secure Ping Server (optional) and an MSDE back-end. More information can be found at http://www.infoexpress.com/security_products/firewall_overview.php The product runs on Windows platforms and allows […]

Juniper : Setting up an IPSec VPN tunnel between a Juniper Netscreen firewall/vpn device and a Cisco VPN device

Today, I will explain the (easy) steps to set up a route-based IPSec VPN tunnel between a Juniper Netscreen firewall/VPN device and a remote Cisco device (such as Cisco ASA) If you are looking for more generic information on IPSec and building VPNs with Juniper, take a look at my blog post on VPNs with […]

Using Active Directory and IAS based Radius for Netscreen WebAuth authentication

As most of the bigger players in the firewall market, Juniper/Netscreen SreenOS based firewalls allow you to use/enforce/require authentication for various reasons : Admin login Client VPN Authentication to open a specific rule on the firewall In a default configuration, ScreenOS uses a local user account database for all types of authentication listed above. In […]

Performing AD Schema Updates in a safe way

Updating from 2003 to 2003 R2 & implementing Exchange are 2 common administrative tasks which both require a schema update. Since I’ve mentioned “updating from 2003 to 2003 R2”, I’ll take the opportunity to add some “notes from the field” to this blog post, which will increase success rate of the update and limit the […]

Creating and installing lzm modules in Backtrack 2

Today, I will explain how you can create your own lzm modules & patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http://www.remote-exploit.org/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final […]

Running Snort with Dynamic IP on Fedora

One of my Linux boxes has a direct cable connection to the internet. I’ve been using Snort in corporate environments for a long time now, but I never had to configure snort to look at interfaces that have a DHCP assigned IP address and actually use that IP address as its HOME_NET. There’s an easy […]

Corelan Live training

Since 2011, Corelan GCV has been teaching live win32 exploit dev classes at various security cons and private companies & organizations.

You can read more about the training and schedules here

Demand Global Change

The world needs your help !

Please take a few moments to read the "Demand Global Change Call For Action" document at
http://bit.ly/demandglobalchange
Read the full document at
http://bit.ly/demandglobalchange_full and share the message with as many people as possible.

Like the Facebook page, and SHARE it with everyone you know.



Donate

Want to support the Corelan Team community ? Click here to go to our donations page.

Want to donate BTC to Corelan Team?



Your donation will help funding server hosting.

Protected by Copyscape Web Plagiarism Tool

Corelan Team Merchandise

You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.

Corelan on IRC

You can chat with us and our friends on #corelan (freenode IRC)

Categories