ASA and ASDM Compatibility Tables

A quick pointer to the ASA software compatability tables.  When checking what version you can update a Cisco ASA to, these tables do prove rather useful. 9.9 to 9.5, Current Models https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html#pgfId-268944 Other release compatability is then provided in the other tables. Legacy Models are shown in Table 6 https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html#pgfId-112283 (Correct at time of publishing, …

Continue reading ‘ASA and ASDM Compatibility Tables’ »

Digitally signing email with S/MIME and the iPhone / iOS

You can use S/MIME certificates, also called “Digital Certificates” or “Personal Certificates”, with most email clients to digitally sign and/or encrypt email messages. In order to digitally sign or encrypt your email, you will need a digital certificate. For a run down on how to get a certificate, and also how to use it in …

Continue reading ‘Digitally signing email with S/MIME and the iPhone / iOS’ »

HTTP Strict Transport Security with Apache

HTTP Strict Transport Security (HSTS) is a web security policy which helps to protect websites against protocol downgrade attacks by allowing web servers to declare that web browsers should only connect via secure HTTPS connections. The HSTS Policy for the site is communicated by the server to the browser via a HTTPS response header field …

Continue reading ‘HTTP Strict Transport Security with Apache’ »

Digitally signing email with S/MIME and Outlook 2016

You can use S/MIME certificates, also called “Digital Certificates” or “Personal Certificates”, with most email clients to digitally sign and/or encrypt email messages. In order to digitally sign or encrypt your email, you will need a digital certificate. Get a certificate For this example, we will use the free certificate service from Comodo. Head over …

Continue reading ‘Digitally signing email with S/MIME and Outlook 2016’ »

ROCA – Return of Coppersmith’s Attack

So it is big in the news this week, ROCA, what’s the deal? I’m not going to cover this in detail yet, however here is what you need to know now: The ROCA vulnerability (tracked as CVE-2017-15361) enables computation of RSA private keys from their public certificate/key counterparts.  The flaw affects the implementation of RSA …

Continue reading ‘ROCA – Return of Coppersmith’s Attack’ »

Deny access to all .php files in a folder using htaccess

In order to further harden a folder, for example an ‘uploads’ folder as used by WordPress, it maybe appropriate to block the execution of key file types. If you have a specific folder where content can be more easily written, blocking execution of script files will help reduce the chance of an attacker executing a …

Continue reading ‘Deny access to all .php files in a folder using htaccess’ »

Cisco ASA Unicast Reverse Path Forwarding Verification Was Disabled

If you have had a firewall audit, and your report states that ‘Unicast Reverse Path Forwarding Verification Was Disabled’ on your Cisco ASA then read on. “Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to …

Continue reading ‘Cisco ASA Unicast Reverse Path Forwarding Verification Was Disabled’ »

Building a UK Street / Road Name Wordlist

If you need to create custom dictionaries or wordlists, there are many options, in this case we were looking for UK specific street / road names. You do not need to ‘scrape’ open street map for data, it is not ideal from their point of view or yours. As the data is open, they do …

Continue reading ‘Building a UK Street / Road Name Wordlist’ »

Monitoring network traffic with port mirroring

If you would like to monitor the traffic between two network devices or network segments, you will need to obtain access to the packet flow between the two hosts or network segments.  In a virtual lab environment we have a number of options, and normally the opportunity to reconfigure things to get access. In a …

Continue reading ‘Monitoring network traffic with port mirroring’ »