I’m resuming again with an article on how to put into practice a exploit that has killed so many victims. I’m doing it simply for increasing the sensitivity of system administrators to the importance of upgrading their systems. Thinking that if the system is not reachable from outside is not necessary to update it is ..
SIngle sign-on protocol is a way to authenticate the users one only time avoiding to reinsert continually username and password for accessing to other services. The process is comfortable from user point of view, secure and scalable for who will manage it. The father of all authentication protocols is the kerberos, standard de facto in ..
In this article I will show how to integrate apache web server with active directory for having a single sign on authentication to allow a windows user to login to a web gui. The web server is running in a linux system in join with a freeipa domain trusted with a active directory domain. The authentication and ..
This article has the goal to improve the awareness about the risks of a pivot attack where the target system is exploited through another compromised system. The classic defense against these type of attacks based on the company’s perimeter is obsolete and it requires new solutions and approaches. The systems are compromised generally by phishing attack forcing the ..
This article aims to raise awareness of system administrator about the cross domain attack and to provide suggestions about how to reduce the exposure to them. The need arises from the awareness that the one of most vector used by hacker for its malicious purposes is to invite to visit a infected site containing java script that attempts ..
This page contains all security vulnerabilities, updates and bulletins of 2017. 2017 Security Vulnerability Bulletins Adobe Releases Security Updatess 17/10/2017 Adobe Releases Security Updatess 16/10/2017 CERT/CC Reports WPA2 Vulnerabilities 04/10/2017 CERT/CC Reports WPA2 Vulnerabilities 04/10/2017 Apache Releases Security Updates for Apache Tomcat 04/10/2017 Apple Releases Security Update for iOS 03/10/2017 Tragic-Event-Related Scams 03/10/2017 National Cybersecurity Awareness ..
The DNS is a critical service often exploited by hackers for gathering information about the company attacked or for distributed deny of service (DDOS). It’s possible to be protected from these attacks configuring opportunely the service. The actions to implement are very easy and it will be explained in this article. The laboratory implemented is described in the following picture. ..
Network segmentation is vital in order to limit the risks for business data after a network intrusion. The goal is to make very difficult the movement of threat inside the network and to give to intruders not authorized the minimun privilege possible for avoiding the exploit of critical services for the business. By phishing campaign it’s very ..
This article shows how is possible to exploit an active directory system by a simple phishing campaign. For this scope I will use metasploit framework: you must know the password (there are different way to stole the password but it is out the scope) of a domain user and have an Active Directory with MS14-68 vulnerability. The goal is to ..
Nginx is a robust and fast reverse proxy. Haproxy is a fast application load balancer. Together can be used for publishing to internet web services in security way. For this reason this article has the objective to explain how to secure web services using nginx and haproxy. The haproxy, in addition to application load balancer functionality, has a ..