DNSSEC Explained (with AWS Route53 Hosted Zone Example)

DNS name resolution is essential to modern connectivity. The ability for hosts to be able to quickly and reliably resolve DNS domain names (e.g. www.google.com) to their IP address equivalents (e.g. 216.58.204.68 or 2a00:1450:4009:827::2004) to connect and consume services ensures consistent and performant network flows. Due to the essential nature of DNS, DNSSEC is an addition … Read more

Firefox: SSL_ERROR_UNSUPPORTED_VERSION

Although you shouldn’t be working around certificates which are very old or no longer meet modern standards e.g. TLS 1.3 etc. if like me you need to access something using TLS 1, you can use Firefox and change the configuration. Use the URL: about:config Then set: security.tls.version.min (from 2/3 to 1), then attempt to access … Read more

Exploring DKIM Validation

To explore how DKIM validation works first got an email in .eml format as an example email which was a known good email where the DKIM validation is OK. Meaning that both the header and the body are unchanged from when the email was first DKIM signed. There is a little tool called “dkimpy”, which … Read more

SSH – Show Supported (Encryption) Algorithms

If you want to verify what your SSH server is providing to clients as options of supported algorithms you can use the following command: It makes use of an NMAP script “ssh2-enum-algos.nse” to enumerate the list of algorithms that the SSH server supports. Useful if you are having issues with clients connecting using supported methods, … Read more

VMware vCenter SSO Authentication via OKTA (with SCIM User Provisioning – Locally Driven)

VMware vCenter can use a multitude of authentication methods, such as LDAP, Active Directory and SAML (ADFS), however since vCenter 8.0 U1 the ability to integrate with OKTA for authentication has been added, which allows for adding MFA (multi-factor authentication) for enhanced security and detaching the vCenter appliance from Active Directory. When switching to use … Read more

What can people really see when you use un-encrypted connections?

Although its becoming increasingly rare nowadays to be using un-encrypted connections, let’s see what it really means at the network level. Un-encrypted connections on their own are not necessarily a problem, its all about what value what you are sending has and therefore what could be exposed to a nefarious actor. If you are viewing … Read more

Road to CISSP – Certified Information Systems Security Professional

IT Security continues to be a very important topic in the IT ecosystem, ensuring your Information Security is as good as it can be also makes good business sense, through the reduction of risk of loss and showing commitment to your customers of your organisation’s quality and capability. Information Security doesn’t just come from technical … Read more