Category Archives capture

Reverse engineering the EXTRABACON exploit Below is a link to a complete breakdown of the EXTRABACON exploit, which was dumped by the hacking group ShadowBrokers. This vulnerability can exploit ASA 9.2(3) code, so be sure to patch any ASA's. Tldr; check out the article below if you're interested in how the exploit works! Side note: SNMP must be exposed to the attacker,…

The Pi-hole is an advertising-aware DNS server that prevents ads from being downloaded. Once installed, configure your router to have DHCP clients use the Pi as their DNS server and then any device that connects to your network will have ads blocked without any further configuration. Alternatively, you can manually set each device to use the Raspberry Pi as its…

Below is an article I found (Got side tracked when looking up if CEF supports IPv6 or if it punts additional IP headers to the CPU - next post perhaps?) about how and when the Cisco IPS inspects traffic. I found IDS and IPS was one of the more interesting topics covered in the CCNA Security Curriculum, so much in…