Wednesday, June 1, 2022
CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN)
Wednesday, May 25, 2022
Live Websites for Information as It Happens.
Flights - ADS-B Exchange, Flightradar24
Maritime - https://www.marinetraffic.com/
Weather and Earth Views- https://zoom.earth/ , The World in Real Time, Latest Earthquakes
Information Security - Live Attacks
Wars - Ukraine War, Live Ukraine Feed
Friday, May 6, 2022
Tech Tip Fortigate
If you are like me the industry standard has turned to MFA (Multi Factor Authentication) for Administrative Accounts or connecting via VPN.
I like and use Fortinet and the FortiGate's NGFW Systems. I was having issues with using LDAP accounts being able to bypass vpn connections with just the standard Windows Account. To be honest it would allow them to connect without a token never even prompting them for the token.
You have to turn set username-sensitivity disable under the users profile in the CLI.
Here is an example.
Hope this helps some admins it was kind of a head scratcher for me.
Thursday, May 5, 2022
Microsoft warns Exchange Online basic auth will be disabled
Microsoft warned customers today that it will start disabling Basic Authentication in random tenants worldwide on October 1, 2022.
This reminder comes after the company's September announcement and after seeing that there are still lots of customers who haven't yet moved their clients and apps to Modern Authentication.
Tuesday, January 12, 2021
Cloud or No Cloud?
Since the whole political thing has happened, Cloud
computing companies have flexed their muscles. If you do not agree with them,
they “do the woke thing” and turn your account off and businesses/lifestyle must
change.
Well yes, they are a private company and can control user
information they processed to what you see. At the same time, they listen or
record keywords in your conversations though the microphones, searches to
solicitate products to you. Then sell that information to advertisers to create
a data pool for them to focus on you.
So, they as big tech data warehouses sell your information as
the Dark Web sells your personal information. I can go buy a credit card on the
Dark Web if your credit score is above what I choose.
Now let us reverse this, I own a drugstore, and a young lady
comes in to buy a morning after pill, and I refuse to sell it to her because I
think it is wrong to do so and I say to that person I am not going to sell this
to her because of just a made-up story I thought she was creating. (I am not
agreeing either way just an example the person could have been raped) No matter
what it is an over-the-counter drug now. No questions asked. Then she goes and
complains that she did not get it because someone at a pharmacy said no.
While being wrong “the drugstore” gets huge number of bad
reviews and then the cloud company that hosted the site kills the businesses
website and communication with the customers. While at the same time it was one
employee that created the issue and was fired, they cannot correct or
communicate what happened.
What I am saying is do not put your eggs in one simple
basket. Your convenience might lead to your downfall.
Friday, December 18, 2020
Procedures for proper Digital Forensic Research.
First of use a computer system just for the recovery and not an everyday used computer. After each use of research wipe the computer with Eraser or Minitool with a low-level destruction algorithm (DoD Complaint).
Next sandbox the computer from any network or internet connection.
Depending on the device I use Autopsy with plug-ins from Video Triage and the LEO Version of BIN Recovery and a few others. I copy them to a usb drive and install them on the newly reloaded computer.
Judging from the data or type of device I am having to analyze it from, I create an image of it or a backup of the data type.
Then I process all plug-ins in Autopsy the following is mostly pay more attention too; Keyword Search, Deleted Files, Video Triage, Image Processor, and the Law Enforcement plug-in.
Depending on the case I would suggest getting a copy of Recuva to also process recovery files.
Autopsy will provide you with really reporting tools. Such as meta-data, (Time, Locations) Also you can generate a detailed report of information down to a single day, month, time.
Then I run the reporting tools finalize the case move all information to external drive and encrypt it, to be handed over to the customer.
Friday, September 25, 2020
The Windows XP source code was allegedly leaked online
The source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today.
The leaker claims to have spent the last two months compiling a collection of leaked Microsoft source code. This 43GB collection was then released today as a torrent on the 4chan forum .
For more information visit; Bleeping Computer
Microsoft confirms Group Policy Editor bug in Windows Server 2016
Microsoft has confirmed that a bug in Windows 10 version 1607 and Windows Server 2016 is causing the Group Policy Editor to display errors.
In our September 2020 Windows health report, we reported that Windows 10 1607 and Windows Server 2016 users were experiencing errors when opening the the Security Options MMC in the group policy editor.
For More Information visit; Bleepingcomputer.com
Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of active exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. A remote attacker can exploit this vulnerability to breach unpatched Active Directory domain controllers and obtain domain administrator access. Applying patches from Microsoft’s August 2020 Security Advisory for CVE-2020-1472 can prevent exploitation of this vulnerability.
CISA has released a patch validation script to detect unpatched Microsoft domain controllers. CISA urges administrators to patch all domain controllers immediately—until every domain controller is updated, the entire infrastructure remains vulnerable. Review the following resources for more information:
For more information visit the site below.
https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon
Monday, December 3, 2018
Friday, September 29, 2017
Configuring Cisco Interfaces
If you ever run into this change around the port speed on your router.
interface GigabitEthernet0/0
switchport access vlan 2
switchport mode access
speed 100
duplex full
Notice the highlighted speed in the config.
corerouter#config t
Enter configuration commands, one per line. End with CNTL/Z.
corerouter(config)#
corerouter(config)#interface GigabitEthernet0/0
corerouter(config)#speed auto
ctrl+z
corerouter#wr
corerouter#reload
Tuesday, September 19, 2017
Getting To Know Powershell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dom | Format-List *
Transferring Active Directory FSMO roles with PowerShell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dc = $dom.FindDomainController()
$dc.TransferRoleOwnership(’PdcRole’)
$dc.TransferRoleOwnership(’InfrastructureRole’)
Raising Active Directory Domain and Forest functionality to Windows 2003 with PowerShell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dom.RaiseDomainFunctionality(’Windows2000NativeDomain’)
$dom.RaiseDomainFunctionality(’Windows2003Domain’)
Enabling and disabling a Global Catalog server with PowerShell
$for = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$gc = $for.FindGlobalCatalog()
$gc.DisableGlobalCatalog()
$gc.EnableGlobalCatalog()
Also if you are like me, I am always looking to clean up unneeded data on your WSUS server.
# WSUS Connection Parameters:
[String]$updateServer = "wsusserver.nrgnetworks.local"
[Boolean]$useSecureConnection = $False
[Int32]$portNumber = 80
# Cleanup Parameters:
# Decline updates that have not been approved for 30 days or more, are not currently needed by any clients, and are superseded by an aproved update.
[Boolean]$supersededUpdates = $True
# Decline updates that aren't approved and have been expired my Microsoft.
[Boolean]$expiredUpdates = $True
# Delete updates that are expired and have not been approved for 30 days or more.
[Boolean]$obsoleteUpdates = $True
# Delete older update revisions that have not been approved for 30 days or more.
[Boolean]$compressUpdates = $True
# Delete computers that have not contacted the server in 30 days or more.
[Boolean]$obsoleteComputers = $True
# Delete update files that aren't needed by updates or downstream servers.
[Boolean]$unneededContentFiles = $True
#EndRegion VARIABLES
#Region SCRIPT
# Load .NET assembly
[void][reflection.assembly]::LoadWithPartialName("Microsoft.UpdateServices.Administration")
# Connect to WSUS Server
$Wsus = [Microsoft.UpdateServices.Administration.AdminProxy]::getUpdateServer($updateServer,$useSecureConnection,$portNumber)
# Perform Cleanup
$CleanupManager = $Wsus.GetCleanupManager()
$CleanupScope = New-Object Microsoft.UpdateServices.Administration.CleanupScope($supersededUpdates,$expiredUpdates,$obsoleteUpdates,$compressUpdates,$obsoleteComputers,$unneededContentFiles)
$CleanupManager.PerformCleanup($CleanupScope)
#EndRegion SCRIPT
Cisco Show Commands
OUTSIDE:
received (in 2395890.690 secs):
317946819 packets 315525385708 bytes
0 pkts/sec 131000 bytes/sec
transmitted (in 2395890.690 secs):
280139669 packets 79618073485 bytes
0 pkts/sec 33001 bytes/sec
1 minute input rate 218 pkts/sec, 142346 bytes/sec
1 minute output rate 192 pkts/sec, 45133 bytes/sec
1 minute drop rate, 7 pkts/sec
5 minute input rate 164 pkts/sec, 109398 bytes/sec
5 minute output rate 153 pkts/sec, 35406 bytes/sec
5 minute drop rate, 6 pkts/sec
INSIDE:
received (in 2395890.690 secs):
255240733 packets 76128164260 bytes
0 pkts/sec 31000 bytes/sec
transmitted (in 2395890.690 secs):
294891373 packets 247485048480 bytes
1 pkts/sec 103001 bytes/sec
1 minute input rate 196 pkts/sec, 44396 bytes/sec
1 minute output rate 234 pkts/sec, 142469 bytes/sec
1 minute drop rate, 5 pkts/sec
5 minute input rate 158 pkts/sec, 35241 bytes/sec
5 minute output rate 178 pkts/sec, 110074 bytes/sec
5 minute drop rate, 4 pkts/sec
DMZ:
received (in 2395890.690 secs):
32384633 packets 2955292920 bytes
0 pkts/sec 1000 bytes/sec
transmitted (in 2395890.690 secs):
49137094 packets 65615227653 bytes
0 pkts/sec 27001 bytes/sec
1 minute input rate 0 pkts/sec, 82 bytes/sec
1 minute output rate 0 pkts/sec, 125 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 1 pkts/sec, 435 bytes/sec
5 minute output rate 1 pkts/sec, 1075 bytes/sec
5 minute drop rate, 0 pkts/sec
management:
received (in 2395890.750 secs):
14277133 packets 946118886 bytes
0 pkts/sec 0 bytes/sec
transmitted (in 2395890.750 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 5 pkts/sec, 424 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 6 pkts/sec, 407 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
Aggregated Traffic on Physical Interface
----------------------------------------
GigabitEthernet0/0:
received (in 2395890.790 secs):
318032181 packets 321511281805 bytes
0 pkts/sec 134000 bytes/sec
transmitted (in 2395890.790 secs):
280139730 packets 85167104894 bytes
0 pkts/sec 35000 bytes/sec
1 minute input rate 218 pkts/sec, 146592 bytes/sec
1 minute output rate 192 pkts/sec, 49034 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 164 pkts/sec, 112593 bytes/sec
5 minute output rate 153 pkts/sec, 38521 bytes/sec
5 minute drop rate, 0 pkts/sec
GigabitEthernet0/1:
received (in 2395890.810 secs):
255241934 packets 81218647412 bytes
0 pkts/sec 33001 bytes/sec
transmitted (in 2395890.810 secs):
294891391 packets 253102758608 bytes
1 pkts/sec 105000 bytes/sec
1 minute input rate 196 pkts/sec, 48364 bytes/sec
1 minute output rate 234 pkts/sec, 146984 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 158 pkts/sec, 38456 bytes/sec
5 minute output rate 178 pkts/sec, 113510 bytes/sec
5 minute drop rate, 0 pkts/sec
GigabitEthernet0/2:
received (in 2395890.850 secs):
32384636 packets 3547413050 bytes
0 pkts/sec 1000 bytes/sec
transmitted (in 2395890.850 secs):
49137094 packets 66502670016 bytes
0 pkts/sec 27000 bytes/sec
1 minute input rate 0 pkts/sec, 98 bytes/sec
1 minute output rate 0 pkts/sec, 138 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 1 pkts/sec, 470 bytes/sec
5 minute output rate 1 pkts/sec, 1108 bytes/sec
5 minute drop rate, 0 pkts/sec
GigabitEthernet0/3:
received (in 2395890.860 secs):
14278281 packets 1203253101 bytes
0 pkts/sec 0 bytes/sec
transmitted (in 2395890.860 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 5 pkts/sec, 531 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 6 pkts/sec, 516 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
GigabitEthernet0/4:
received (in 2395890.900 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
transmitted (in 2395890.900 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec, 0 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
GigabitEthernet0/5:
received (in 2395890.910 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
transmitted (in 2395890.910 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec, 0 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
Internal-Control0/0:
received (in 2395890.950 secs):
4813061 packets 348829320 bytes
0 pkts/sec 0 bytes/sec
transmitted (in 2395890.950 secs):
5452144 packets 383499485 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 2 pkts/sec, 146 bytes/sec
1 minute output rate 2 pkts/sec, 160 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 2 pkts/sec, 145 bytes/sec
5 minute output rate 2 pkts/sec, 160 bytes/sec
5 minute drop rate, 0 pkts/sec
Internal-Data0/0:
received (in 2395890.960 secs):
21248059 packets 1966209991 bytes
1 pkts/sec 1 bytes/sec
transmitted (in 2395890.960 secs):
6170575 packets 958796353 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 8 pkts/sec, 850 bytes/sec
1 minute output rate 2 pkts/sec, 402 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 8 pkts/sec, 836 bytes/sec
5 minute output rate 2 pkts/sec, 403 bytes/sec
5 minute drop rate, 0 pkts/sec
Internal-Data0/1:
received (in 2395890.990 secs):
603754038 packets 429853468179 bytes
1 pkts/sec 179000 bytes/sec
transmitted (in 2395890.990 secs):
603754038 packets 429853468179 bytes
1 pkts/sec 179000 bytes/sec
1 minute input rate 397 pkts/sec, 209501 bytes/sec
1 minute output rate 397 pkts/sec, 209501 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 313 pkts/sec, 164474 bytes/sec
5 minute output rate 313 pkts/sec, 164474 bytes/sec
5 minute drop rate, 0 pkts/sec
Internal-Data0/2:
received (in 2395891.020 secs):
6170575 packets 918208209 bytes
0 pkts/sec 1 bytes/sec
transmitted (in 2395891.020 secs):
21248059 packets 1881217957 bytes
1 pkts/sec 0 bytes/sec
1 minute input rate 2 pkts/sec, 385 bytes/sec
1 minute output rate 8 pkts/sec, 815 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 2 pkts/sec, 386 bytes/sec
5 minute output rate 8 pkts/sec, 800 bytes/sec
5 minute drop rate, 0 pkts/sec
Management0/0:
received (in 2395891.040 secs):
14278311 packets 1146069880 bytes
0 pkts/sec 1 bytes/sec
transmitted (in 2395891.040 secs):
0 packets 0 bytes
0 pkts/sec 0 bytes/sec
1 minute input rate 5 pkts/sec, 507 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 6 pkts/sec, 492 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
1-hour Sent byte: 423 241 0 1523092
1-hour Sent pkts: 2 1 0 9023
1-hour Recv byte: 1 0 0 3632
1-hour Recv pkts: 0 0 0 48
Monitoring window size: 30 mins Sampling interval: 30 secs
Basic HTTP Enable Commands for Cisco Routers
ciscorouter#en
ciscorouter#config t
ciscorouter#ip http server
ciscorouter#ip http authentication local
ciscorouter#ip http secure-server
Ctrl+z
wr
On Another Note if you have not removed SSL V2 and V3
You need to disable it so you can do this by the following commands
ciscorouter#en
ciscorouter#config t
ciscorouter#no ip http server
ciscorouter#no ip http authentication local
ciscorouter#no ip http secure-server
Ctrl+z
wr
How To Show ASA Active Sessions
ciscoasa#show vpn-sessionsdb summary
Thursday, June 2, 2016
Blacklist IP's
object-group network Custom_Block_List
network-object host 23.250.11.220
network-object host 209.10.104.55
network-object host 119.81.240.10
network-object host 118.192.3.3
network-object host 89.248.171.137
network-object 222.186.21.0 255.255.255.0
network-object object 89.248.168.128
network-object host 213.136.90.120
network-object host 80.82.70.238
network-object 162.252.172.0 255.255.255.0
network-object object 188.138.9.51
network-object host 91.219.238.193
network-object host 61.216.2.15
network-object 185.40.4.182 255.255.255.255
network-object host 209.126.116.147
network-object object 125.64.94.200
network-object 123.59.59.0 255.255.255.0
network-object host 93.174.93.94
network-object host 80.82.65.61
network-object host 125.64.94.200
network-object host 80.82.78.38
network-object 185.45.13.0 255.255.255.0
network-object host 208.100.26.228
Attacks and Scans
-Gary
Monday, May 16, 2016
Sample Adtran NetVanta 3430 Config
Building configuration...
!
!
! ADTRAN, Inc. OS version R11.8.0
! Boot ROM version 17.06.01.00
! Platform: NetVanta 3430, part number 1202820G1
! Serial number ******
!
!
hostname "corerouter"
enable password encrypted 323ab2216eb4ffgghhb25bcc426298ddfggba2625f57
!
!
clock timezone -5-Eastern-Time
!
ip subnet-zero
ip classless
ip default-gateway 192.168.1.1
ip routing
ipv6 unicast-routing
!
!
domain-name "gnet.local"
domain-proxy
name-server 208.67.222.222 208.67.220.220
!
!
no auto-config
auto-config authname adtran encrypted password 383e4bc8685e2bf8b1350b96da4ae62fc205
!
event-history on
no logging forwarding
logging forwarding priority-level info
logging email on
logging email receiver-ip 192.168.0.1 auth-username usrname auth-password encrypted 43lkmfdmskm454
logging email address-list glangston@ksbankinc.com
logging email ip urlfilter top-websites address-list glangston@knrgnetworksinc.com
logging email sender glangston@nrgnetworksinc.com
!
service password-encryption
!
username "admin" password encrypted "4048f6b33g249c127e28ac48fdd3452203161619f745"
!
banner motd #
#
!
!
ip firewall
no ip firewall alg msn
no ip firewall alg mszone
no ip firewall alg h323
!
!
!
!
!
!
!
!
!
!
no dot11ap access-point-control
!
!
!
ip security monitor stats-filter web-stats-filter
threat 201
!
ip security monitor
stats-filter web-stats-filter
!
!
!
!
!
!
!
!
ip urlfilter Web_Http_Filter http
!
!
!
!
!
!
!
!
!
no ethernet cfm
!
interface eth 0/1
ip address 10.207.177.97 255.255.255.248
no shutdown
!
!
interface eth 0/2
no ip address
shutdown
!
!
!
!
interface t1 1/1
clock source internal
fdl att
tdm-group 1 timeslots 1-24 speed 64
no shutdown
!
!
interface fr 1 point-to-point
frame-relay lmi-type ansi
no shutdown
!
interface ppp 1
ip address 12.124.191.18 255.255.255.252
ip mtu 1500
ip urlfilter Web_Http_Filter in
ip urlfilter Web_Http_Filter out
no shutdown
cross-connect 1 t1 1/1 1 ppp 1
!
interface hdlc 1
no ip address
no shutdown
!
!
!
!
!
!
ip access-list standard wizard-ics
remark Internet Connection Sharing
permit any
!
!
ip access-list extended self
remark Traffic to NetVanta
permit ip any any log
!
ip access-list extended wizard-remote-access
remark do not hand edit this ACL
permit tcp any any eq telnet log
permit icmp any any echo log
permit ip host 192.168.10.1 any log
!
!
!
!
ip policy-class Private
allow list self self
!
ip policy-class Public
allow list wizard-remote-access self
!
!
!
ip route 0.0.0.0 0.0.0.0 12.114.121.217
!
no tftp server
no tftp server overwrite
http server
http secure-server
no snmp agent
no ip ftp server
ip ftp server default-filesystem flash
no ip scp server
no ip sntp server
!
!
!
line con 0
login
password encrypted 2821704d6ad1dde8ac0fdfdfdbe6a02f3aa429fcbe
!
line telnet 0 4
login
password encrypted 3e36e4defd8afdfd26bnb3c7edb47d0117a42bb7952
no shutdown
line ssh 0 4
login local-userlist
no shutdown
!
sntp server time-b.nist.gov
!
!
!
!
end
corerouter#