I had to build out a Debian server for a project I was working on at home and my internet went down just as I started the build, deciding not to wait until it came back up; I went ahead with the build and finish the configs, upgrades and whatever else would be needed once the interwebs started working again.
The major issue I had was that networking was not able to be configured due to no connection found, that in turn left my software config to use the install media alone. Continue reading Net Interface not loaded in Debian
Netgear noted that several of their routers have a command injection Vulnerability issue where an attacker can use a phishing method to gain control of your router.
To find the model/version number, check the bottom or back panel of your NETGEAR device.
From the vulnerability Notes Database:
R6200, R6250, R6400, R6700, R6900, R7000, R7100LG, R7300, R7900, R8000, D6220, and D6400 contain an unauthenticated command injection vulnerability that may be executed directly or via cross-domain requests. Known affected firmware versions include Netgear R7000 version 22.214.171.124_1.1.93, R6400 version 126.96.36.199_1.0.11, and R8000 version 188.8.131.52_1.1.2. Earlier versions may also be affected. The command injection vulnerability has been assigned CVE-2016-6277.
By convincing a user to visit a specially crafted web site, a remote, unauthenticated attacker may execute arbitrary commands with root privileges on affected routers. An unauthenticated, LAN-based attacker may do the same by issuing a direct request, e.g. by visiting: http:///cgi-bin/;COMMAND
Continue reading Netgear Router Security Update
Ok, I know you’re wondering why I would ever want to setup WiFi on a server. Well, this was a small server to do some light work and I had a mini pc that had a builtin WiFi card that I used and since it had the option I figured I’d use the convenience rather than having to run another cable.
Continue reading Configure WiFi on an Ubuntu Server
I know, Windows XP is not supported anymore and should not be used but some people are still using it. If you are one of those people or know someone that does that is getting this error message or something similar relate to IP renewal:
Windows has tried but cannot Renew you IP Address
Here is how to fix it:
Basically we’ll be repairing the TCP/IP Stack
Start Command Prompt
Use one of the following methods:
- Hold the
Windows key and press
R, then type
CMD to open a command prompt
CMD to open a command prompt
If those don’t work, run it as admin:
All Programs →
- Right click on
Command Prompt and select
Run as… or
Run as administrator
Reset TCP/IP stack to installation defaults.
netsh int ip reset reset.log
Reset WINSOCK entries to installation defaults:
netsh winsock reset catalog
Reboot the machine.
Ok folks, after many moons trying to fix this issue in Yosemite I finally got it… If you are running earlier versions of OSX, see here for the fix.
What am I talking about?
Append search domains for partially qualified domain names when performing DNS lookups. You know.. For example, you work in it and ssh to hosts regularly and your company uses
hostname.domain.com but you want to ssh to
hostname.sub to shave some time off your clock. With older versions you could apply a fix with mDNSResponder to work around whatever Apple decided to do there; around rolls Yosemite and they change the whole damn thing around. Continue reading Fix for broken search domain resolution in OS X Yosemite
Cisco announced a new managed threat detection service that collects real-time telemetry from a customer’s network, alerts the enterprise’s IT team when a threat has entered the network and offers guidance for remediation.
The new Cisco managed security services offering, Managed Threat Defense (MTD), begins with a Hadoop 2.0 cluster that enterprises deploy within their networks. The minimum footprint is a two-rack Cisco Unified Computing System comprised of 30 servers.
“The cluster is ingesting various forms of telemetry — like NetFlow — as well as full packets [captured at data center and Internet ingress and egress points],” said Pablo Salazar, manager within the Cisco Security Solutions organization. “[The cluster] ingests full packets and stores them for forensic purposes, as well as extracts metadata which we use for analytics.”
Metadata from the Hadoop cluster traverses a VPN link to Cisco’s 24-by-7 security operation centers (SOCs) where Cisco engineers detect threats by applying a variety of Cisco’s behavioral analysis and threat detection technologies, as well as using threat intelligence data collected and analyzed by Cisco’s Security Intelligence Operations.
“This operationalizes anomaly detection,” said Bryan Palma, senior vice president of Cisco Security Services. “We don’t tell customers an incident might have happened. We tell them when it happened, what it is and what they need to do to take remediation.”
The Heartbleed Web-security flaw has been found in the hardware connecting homes and businesses to the Internet, underscoring the amount of time and effort that will be needed to defuse the threat.
Cisco Systems Inc. (CSCO) and Juniper Networks Inc. (JNPR) said some of their networking products are susceptible to the encryption bug, which was recently discovered by researchers at Google Inc. (GOOG) and prompted companies and government agencies to seek fixes to block hackers from gaining access to user names, passwords and other sensitive information.
The Heartbleed warnings come at a time of mounting concern about the security of information following consumer-data breaches at Target Corp. and Neiman Marcus Group Ltd. and the spying scandal involving the National Security Agency. While security experts urged consumers to change their Web passwords as soon as possible, it will take longer to fix networking equipment and software as Cisco and Juniper will have to rely on customers applying the patches they push out, according to Jaime Blasco, director of AlienVault Labs, part of AlienVault LLC.
“It’s more painful to update these kinds of devices,” Blasco said. “You have to go one by one.”