What I learned in hacking school.
There’s no denying the fact that firewalls are a necessary part of modern perimeter security. NAT isn’t a security construct. Attackers have the equivalent of megaton nuclear arsenals with access to so many DDoS networks. Security admins have to do everything they can to prevent these problems from happening. But one look at firewall market tells you something is terribly wrong.
Take a look at this recent magic polygon from everyone’s favorite analyst firm:
I won’t deny that Checkpoint is on top. That’s mostly due to the fact that they have the biggest install base in enterprises. But I disagree with the rest of this mystical tesseract. How is Palo Alto a leader in the firewall market? I thought their devices were mostly designed around mitigating internal threats? And how is everyone not named Cisco, Palo Alto, or Fortinet regulated to the Niche Players corral?
The issue comes down to purpose. Most firewalls today aren’t packet filters. They aren’t designed to keep the bad guys out of your networks. They are unified threat management systems. That’s a fancy way of saying they have a whole bunch of software built on top Continue reading
In the cloud and security realm, VMware's NSX has landed a notable customer.
HP is taking mobility to the campus with new products it announced today at Interop.
Winner gets a pair of SDxCentral socks. We're not kidding.
Automated security policies can help you roll out apps faster, get more granular with your security, and reduce over provisioning.
Every now and then someone actually looks at the VXLAN packet format and eventually figures out that VXLAN encapsulation doesn’t provide any intrinsic security.
TL&DR Summary: That’s old news, the sky is not falling, and deploying VXLAN won’t make your network less secure than traditional VLAN- or MPLS-based networks.
Read more ...The speed and scope of DevOps just broadens the network security problem.
At least there weren't any wild animals.
Encryption is a threat to public safety, the Secretary of Homeland Security says.
Not quite a home run, but Yoran draws good marks as he (vaguely) calls for standards in security reporting.
Big Switch Networks and Cyphort have just announced a new partnership that will bring a SDN defense product to market by combining Big Tap and Advanced Threat Defense Platform.
Another partnership between the two giants, this time targeting telco-managed security.
Juniper, DevOps, and RSA itself — it's a packed week at the annual security confab.
Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? "PASS OXYGEN ON" Anyone ? :)
— Chris Roberts (@Sidragon1) April 15, 2015
DFW->SFO. Playing with airplane wifi. I Continue reading
IoT Needs Security-Enabled Networks with SDN
Ron Flax is the Vice President of August Schell, a reseller of VMware products and IT services company that specializes in delivering services to commercial accounts and the federal government, particularly intelligence and U.S. Department of Defense. Ron is a VCDX-NV certified network virtualization professional and a VMware vExpert. We spoke with Ron about network virtualization and the NSX career path.
***
The most exciting thing about network virtualization, I think, is the transformative nature of this technology. Networks have been built the same way for the last 20 to 25 years. Nothing has really changed. A lot of new features have been built, a lot of different technologies have come around networks, but the fundamental nature of how networks are built has not changed. But VMware NSX, because it’s a software-based product, has completely altered everything. It enables a much more agile approach to networks: the ability to automate the stand-up and tear-down of networks; the ability to produce firewalling literally at the virtual network interface. And because things are done at software speed, you can now make changes to the features and functions of networking products at software speed. You no longer have to deal with Continue reading
Range: bytes=0-18446744073709551615As you can see, it's just a standard (64-bit) integer overflow, where 18446744073709551615 equals -1.
HTTP/1.1 416 Requested Range Not SatisfiableFrom the PoC's say, a response that looks like the following means that it is patched:
The request has an invalid header nameHowever, when I run the scan across the Internet, I'm getting the following sorts of responses from servers claiming to be IIS: