Archive

Category Archives for "Networking"

IoT security camera infected within 98 seconds of plugging it in

One and a half minutes is all it took after plugging in an internet-connected security camera for the camera be infected with malware.Unlike the average Jane or Joe Doe who would not want their security camera to be immediately infected with malware, Rob Graham, CEO of Errata Security, called it “fun” to watch the infection happen. He tweet-documented his experience.Graham purchased an inexpensive device – this $55 IoT security camera made by JideTech.To read this article in full or to leave a comment, please click here

IoT security camera infected within 98 seconds of plugging it in

One and a half minutes is all it took after plugging in an internet-connected security camera for the camera be infected with malware.Unlike the average Jane or Joe Doe who would not want their security camera to be immediately infected with malware, Rob Graham, CEO of Errata Security, called it “fun” to watch the infection happen. He tweet-documented his experience.Graham purchased an inexpensive device – this $55 IoT security camera made by JideTech.To read this article in full or to leave a comment, please click here

OFNet SDN network emulator

OFNet is a new software-defined network (SDN) emulator that offers functionality similar to the Mininet network emulator and adds some useful tools for generating traffic and monitoring OpenFlow messages and evaluating SDN controller performance.

ofnet-splash

OFNet is an open-source project that is distributed as a virtual machine (VM) image. The OFNet source code is available in the OFNet VM’s filesystem. In this post, we will use the OFNet VM provided by the OFNet developer to run SDN emulation scenarios in OFNet.

The OFNet Virtual Machine

The OFNet VM image is packaged as an OVA file which can be imported into most virtual machine managers. In this case, we are using VirtualBox. You may download the OFNet VM from this link.

The OFNet VM contains a Linux system running Ubuntu 12.04 and has the VirtualBox extensions installed.

Create a new virtual machine using the OFNet VM image, start up the VM and log in. After logging in, review the available OFNet documentation and install Wireshark.

Install the OFNet VM in VirtualBox

Import the OFNet.ova file into VirtualBox. Use the File → Import Appliance VirtualBx menu command or press <Ctrl-I>. Navigate to the location where you saved the OFNet.ova file Continue reading

Amazon Discounts Kindle E-Readers Up To $30 Through 11/28 – Deal Alert

Amazon has quietly released another good set of deals on its popular Kindle series of e-readers, and this time the discount runs through 11/28 only. Kindle's price sinks $30, Kindle Paperwhite is discounted $20, the Kindle Voyage drops $30, and the worry-free Kindle for Kids Bundle is reduced $30 as well.  To read this article in full or to leave a comment, please click here

Best Black Friday 2016 Windows deals

While Windows phone deals are not surprisingly few and far between for Black Friday 2016, plenty of other Microsoft Windows desktops and laptops, Surface tablets and Xbox gaming deals can be had this holiday shopping season. Come Nov. 25, and even earlier for Microsoft itself and retailers, here are some of the best deals around.(Websites such as BFads.net, BlackFriday.com and BestBlackFriday.com have all been helpful in collecting this information.) To read this article in full or to leave a comment, please click here

Internet of Things Messaging, Part 1: Introducing MQTT

In the world of the Internet of Things one thing you’ve got lots of, apart from things, is messages. When IoT devices generate messages, they send stuff like status reports and environmental measurements; when they receive, they’re being told what to do (“open that valve” or “send your status”) or they’re storing data from other devices or, or ,or … there are endless use cases. Moreover, the number of IoT devices is growing incredibly fast and only their combined message traffic is growing faster. And as well as the explosion of the IoT, there are applications running on smartphones, tablets, and computers that all need the same type of messaging service.To read this article in full or to leave a comment, please click here

Reverese Shell on Linux

Reverse shell is technique when a client connects to a server and the client provides its shell to the server. Clients is typically a host hidden behind the NAT or a firewall having an access to the server but not vice versa. Thanks to a reverse shell the server controls a client's shell having an access to the client's network even the client is hidden behind the NAT. They are several methods how to create a reverse shell used depending on software available on the client. I will show how to create a reverse shell using SSH, Ncat and Bash.

picture1-network_topology

Picture 1 - Network Topology

Picture 1 shows our testing topology. The client (Ubuntu Server 16.04) is located behind the NAT with the IP address 192.168.1.4/24. The server (Kubuntu 16.04) has assigned the IP address 172.17.100.7/16.

1. Reverse Shell Using SSH Reverse Tunnel

This method is based on the fact that the client has knowledge of the server SSH login credentials and vice versa. SSH server must be running on both the server and client. Client must be allowed to access server through firewall.

Client:
$ ssh -R 10000:127.0.0.1:22 [email protected]. Continue reading

The -B Domain for Cisco Access Points

I know I am a few months late on this one, but figured it would be worth throwing out there. Earlier in the year Cisco updated and released its access points to be compliant with -B domain regulations set forth by the FCC in North America. After May 1st 2016, all Access points ordered and […]

Trump’s national security pick is a cybersecurity hawk

Michael Flynn, the man President-elect Donald Trump plans to name as U.S. national security advisor, believes the government is falling behind on cybersecurity. Trump named Flynn to his cabinet on Friday after the former military intelligence leader acted as the top military advisor to Trump's presidential campaign. Flynn previously was director of the Defense Intelligence Agency and has served in U.S. intelligence operations in Afghanistan and Iraq. Flynn holds strong views on cybersecurity. He’s called U.S. cyber capabilities “underwhelming.” “We have competitors out there that are rapidly catching up with us,” he said in a speech posted online last year. In 2014, after retiring as a general, he started a consulting firm called Flynn Intel Group that specializes in preventing cyber threats for clients.To read this article in full or to leave a comment, please click here

Trump’s national security pick is a cybersecurity hawk

Michael Flynn, the man President-elect Donald Trump plans to name as U.S. national security advisor, believes the government is falling behind on cybersecurity. Trump named Flynn to his cabinet on Friday after the former military intelligence leader acted as the top military advisor to Trump's presidential campaign. Flynn previously was director of the Defense Intelligence Agency and has served in U.S. intelligence operations in Afghanistan and Iraq. Flynn holds strong views on cybersecurity. He’s called U.S. cyber capabilities “underwhelming.” “We have competitors out there that are rapidly catching up with us,” he said in a speech posted online last year. In 2014, after retiring as a general, he started a consulting firm called Flynn Intel Group that specializes in preventing cyber threats for clients.To read this article in full or to leave a comment, please click here

IoT attacks could bring real-world damage

Members of Congress received a dire warning this week about security vulnerabilities in the so-called internet of things (IoT), as cyber experts cautioned that with billions of new devices coming online, coordinated hacking attacks could become -- literally -- a matter of life and death.House lawmakers convened the hearing on IoT security in response to last month's distributed denial-of-service attack on the internet addressing provider Dyn, which resulted in temporary outages at popular sites like Twitter and Spotify.[ Related: How the Dyn DDoS attack unfolded ]To read this article in full or to leave a comment, please click here

IoT attacks could bring real-world damage

Members of Congress received a dire warning this week about security vulnerabilities in the so-called internet of things (IoT), as cyber experts cautioned that with billions of new devices coming online, coordinated hacking attacks could become -- literally -- a matter of life and death.House lawmakers convened the hearing on IoT security in response to last month's distributed denial-of-service attack on the internet addressing provider Dyn, which resulted in temporary outages at popular sites like Twitter and Spotify.[ Related: How the Dyn DDoS attack unfolded ]To read this article in full or to leave a comment, please click here

With CIA choice, Trump picks a foe of Silicon Valley’s encryption stance

In his nomination of Representative Mike Pompeo to head the CIA, President-elect Donald Trump has picked someone who has supported NSA surveillance programs and has criticized Silicon Valley's stance on encryption.Pompeo, a Republican from Kansas, is a former cavalry officer in the U.S. Army and a graduate of West Point military academy. He currently serves on the House Intelligence Committee and is perhaps best known for his role on the Benghazi committee that investigated Hillary Clinton.But his committee assignment has also put him in the middle of several recent issues that have pitched the U.S. intelligence community against major tech companies.To read this article in full or to leave a comment, please click here

With CIA choice, Trump picks a foe of Silicon Valley’s encryption stance

In his nomination of Representative Mike Pompeo to head the CIA, President-elect Donald Trump has picked someone who has supported NSA surveillance programs and has criticized Silicon Valley's stance on encryption.Pompeo, a Republican from Kansas, is a former cavalry officer in the U.S. Army and a graduate of West Point military academy. He currently serves on the House Intelligence Committee and is perhaps best known for his role on the Benghazi committee that investigated Hillary Clinton.But his committee assignment has also put him in the middle of several recent issues that have pitched the U.S. intelligence community against major tech companies.To read this article in full or to leave a comment, please click here

Grace Hopper Awarded Honour

Grace Hopper is a towering figure in the computer history. Here she is being interviewed at 80 years of age. Today this is especially relevant since she was awarded the Presidential Medal of Freedom today.   .@POTUS names #USNavy computer pioneer Rear Adm. Grace Hopper one of 21 Presidential Medal of Freedom recipients – https://t.co/raxd3upel1 […]

The post Grace Hopper Awarded Honour appeared first on EtherealMind.

5 steps to ensure success when migrating unified communications to the cloud

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Ready or not, unified communications is starting to move to the cloud. A recent survey by BroadSoft predicts that cloud UC market penetration will jump almost six times in the next four years, from 7% percent today to 41% of the overall UC space by 2020.According to Gartner, “the UC-as-a-Service market as a whole is transitioning from the ‘early adopter phase’ to the ‘early mainstream phase’ for enterprise delivery.” Even those enterprises once reluctant to move to the cloud are gazing upward and putting small groups of users into the cloud.To read this article in full or to leave a comment, please click here

5 steps to ensure success when migrating unified communications to the cloud

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Ready or not, unified communications is starting to move to the cloud. A recent survey by BroadSoft predicts that cloud UC market penetration will jump almost six times in the next four years, from 7% percent today to 41% of the overall UC space by 2020.

According to Gartner, “the UC-as-a-Service market as a whole is transitioning from the ‘early adopter phase’ to the ‘early mainstream phase’ for enterprise delivery.” Even those enterprises once reluctant to move to the cloud are gazing upward and putting small groups of users into the cloud.

To read this article in full or to leave a comment, please click here

Comodo Certification Manager relieves the burden of managing security certificates manually  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Digital certificates provide the backbone of information security and trust on the Internet. Demand for certificates is exploding as companies use them to secure and build trust in web transactions, email messages, application code, and devices such as those on the Internet of Things. The use case for digital certificates continues to expand as more people and devices become connected. It’s not unusual for an enterprise organization to have 10,000 or more certificates in use. For example, a company might use certificates to digitally sign and encrypt email messages and attachments. Allowing for one certificate per email account, this can amount to tens of thousands of certificates for this use case alone.To read this article in full or to leave a comment, please click here

Comodo Certificate Manager relieves the burden of managing security certificates manually  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Digital certificates provide the backbone of information security and trust on the Internet. Demand for certificates is exploding as companies use them to secure and build trust in web transactions, email messages, application code, and devices such as those on the Internet of Things. The use case for digital certificates continues to expand as more people and devices become connected. It’s not unusual for an enterprise organization to have 10,000 or more certificates in use. For example, a company might use certificates to digitally sign and encrypt email messages and attachments. Allowing for one certificate per email account, this can amount to tens of thousands of certificates for this use case alone.To read this article in full or to leave a comment, please click here

Comodo Certification Manager relieves the burden of managing security certificates manually  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Digital certificates provide the backbone of information security and trust on the Internet. Demand for certificates is exploding as companies use them to secure and build trust in web transactions, email messages, application code, and devices such as those on the Internet of Things. The use case for digital certificates continues to expand as more people and devices become connected. It’s not unusual for an enterprise organization to have 10,000 or more certificates in use. For example, a company might use certificates to digitally sign and encrypt email messages and attachments. Allowing for one certificate per email account, this can amount to tens of thousands of certificates for this use case alone.To read this article in full or to leave a comment, please click here