My question that I want to share in this article is whether the public cloud is truly an instrument of liberation from technological annoyances, or an instrument of caging our professional freedom within technical enclosures that the professional elites has designed for all. Who says that a company cannot develop following new and innovative approaches, ..
As I explained in my previous article, https://www.securityandit.com/network/best-practices-for-network-segmentation/. network segmentation is vital in order to limit the risks for business data after a network intrusion. The goal is to make very difficult the movement of threat inside the network and to give to intruders not authorized the minimun privilege possible for avoiding the exploit of critical services ..
I’m resuming again with an article on how to put into practice a exploit that has killed so many victims. I’m doing it simply for increasing the sensitivity of system administrators to the importance of upgrading their systems. Thinking that if the system is not reachable from outside is not necessary to update it is ..
SIngle sign-on protocol is a way to authenticate the users one only time avoiding to reinsert continually username and password for accessing to other services. The process is comfortable from user point of view, secure and scalable for who will manage it. The father of all authentication protocols is the kerberos, standard de facto in ..
In this article I will show how to integrate apache web server with active directory for having a single sign on authentication to allow a windows user to login to a web gui. The web server is running in a linux system in join with a freeipa domain trusted with a active directory domain. The authentication and ..
This article has the goal to improve the awareness about the risks of a pivot attack where the target system is exploited through another compromised system. The classic defense against these type of attacks based on the company’s perimeter is obsolete and it requires new solutions and approaches. The systems are compromised generally by phishing attack forcing the ..
This article aims to raise awareness of system administrator about the cross domain attack and to provide suggestions about how to reduce the exposure to them. The need arises from the awareness that the one of most vector used by hacker for its malicious purposes is to invite to visit a infected site containing java script that attempts ..
The DNS is a critical service often exploited by hackers for gathering information about the company attacked or for distributed deny of service (DDOS). It’s possible to be protected from these attacks configuring opportunely the service. The actions to implement are very easy and it will be explained in this article. The laboratory implemented is described in the following picture. ..
Network segmentation is vital in order to limit the risks for business data after a network intrusion. The goal is to make very difficult the movement of threat inside the network and to give to intruders not authorized the minimun privilege possible for avoiding the exploit of critical services for the business. By phishing campaign it’s very ..
This article shows how is possible to exploit an active directory system by a simple phishing campaign. For this scope I will use metasploit framework: you must know the password (there are different way to stole the password but it is out the scope) of a domain user and have an Active Directory with MS14-68 vulnerability. The goal is to ..