This post will be the first of many detailing my CCNA Security Study Notes as I go. I've been somewhat slack and life events have arisen which has slowed my CCNA Security studies of late, however I'm going to be updating the site as I go with my study notes; Lets get to it! Network Security really dives deep with the…
Posts By Timothy
At the time of this post, I had limited exposure to ASA 9.2 code and particularly using FQDN access-lists. Essentially what you can do is create an object with the Fully Defined Domain Name (FQDN) of a domain nested within. You can create multiple of these and place them inside a single object-group to keep things tidy (and you should!).…
Below is a proof of concept which can be used to track a user on a GSM tower without the user even knowing. Interesting to think what can be done with this.. Source: How to use old GSM protocols/encodings to know if a user is Online on the GSM Network AKA PingSMS 2.0 - Simone Margaritelli
The average attack sizes for DNS, NTP, SSDP and Chargen reflection amplification attacks all increased in Q2 2015. According to Arbor Networks, which found that the largest attack monitored in Q2 was a 196Gbps UDP flood, which it characterized as a large, but no longer uncommon, attack size. Source: Global DDoS Attacks Grow in Size and Speed What a…