Palo Alto HA Architecture
HA Architecture – Links HA1 (control link), HA1 backup, Heartbeat backup Config synchronization Management plane runtime state synchronization FIB, user-group mappings, DHCP leases, DNS cache, etc. HA state communication HA2 (data link) & HA2 backup Session synchronization A/P – We do not sync ICMP sessions. A/A – We do notRead More →
OWASP Calculator
Using this Link calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment. https://owasp.sysworklabs.com/Read More →
OWASP API Security Top 10 2019
The Ten Most Critical API Security Risks First edition of the OWASP API Security Top 10Read More →
Mozilla’s VPN service has officially launched
Mozilla’s VPN service has officially launched and is now available for Windows and Android in six countries worldwide, including the US, Canada, and the UK, the company announced today. The service is available for $4.99 a month, and, like other VPNs, it’s designed to make your web-browsing more private andRead More →
Two Factor Authentication
A password alone will not protect sensitive information from hackers–two-factor authentication is also necessary. It’s nearly impossible to truly secure an online or mobile account with just a password. Data breaches, malware, device theft, and other methods can be used to compromise digital passwords, no matter how secure they are. Cyber Hygenic practices are necessary, we should tell the importance of 2FA to Friends, Family, colleagues, and encourage them to enable 2FA. Two-factor authentication whenRead More →
Weekly Threat Report 3rd July 2020
The NCSC’s weekly threat report is drawn from recent open source reporting. Unauthorised Data Sharing A survey from data discovery and auditing software vendor Netwrix has revealed that inappropriate data sharing continues to be a problem for companies and businesses. The research shows that whilst most companies store their data in designatedRead More →
Minimalistic TCP / UDP Port Scanner – PowerShell
Introducing another addition to our portfolio of minimalistic tools for pentesting. This time we are going to be looking on a minimalistic TCP and UDP port scanner. Written in pure PowerShell, this small yet powerful port scanner is useful in specific attack simulations where we cannot use any traditional orRead More →
Understanding WHM Jailed Shell Access
Providing SSH access to your clients is risky at best. On the one hand, you give them the capability to perform advanced customizations on the server and view a lot of the “behind the scenes” activity. On the other, it’s a wide open security threat as it is extremely difficultRead More →
How To Install Your Own Video Conferencing System For Free – Mattermost
This will show you how to install a Self-hosted team communication/ chat platform that supports video/ voice calls for free. Mattermost is built using new modern technologies like Go programming language, ReactJS, and uses MySQL or PostgreSQL. Features include: channels, private messaging, inline-media, full-text-search for messages, multi-languages support, files/ imagesRead More →
Apache Example VirtualHost Configurations
The excerpts below show some example name-based VirtualHost configurations that can be used in Apache. For more detailed instructions, For each TCP port that you want to use to serve content, you will need to define a Listen directive before configuring your VirtualHosts. When using Apache version 2.2.x or lower,Read More →
Palo Alto Networks TAC Support Dos and Don’ts
In the last few weeks, the COVID-19 pandemic has caused many businesses to change their operations overnight and require remote work for the well-being of their employees. With more individuals working via home networks, there has been an increased need for cybersecurity professionals to ensure their companies are still operatingRead More →