Have You Got the Multi-Factor?

A big topic at the moment in Information Security is multi-factor authentication(MFA), also known as two factor authentication (2FA). So the first question, what is a “factor”? Put simply a “factor” is element that a principal (i.e. a person trying to logon to a system) can use to prove to the system they are the … Read more

NetApp Running SMB version 1 Impacted by Microsoft Windows (KB5019964) for CVE-2022-37967

NOTE: See https://geekmungus.co.uk/?p=3619 for the most up to date article! We’ve had an issue with the recent “Security Update for Microsoft Windows (KB5019964)” update, as by the looks of it a load of other people. In our case we are running Microsoft Windows 2016 domain controllers, the NetApp filers are pretty old we’re readying to … Read more

ISC2 Certified Information System Security Professional – CISSP Registration Timeline

I’ve recently passed the CISSP exam. Passing the exam is just one step in becoming a Certified Information System Security Professional, once you’ve passed the exam there are additional steps required to achieve the certification. There is a lot of chatter about exactly how long the process takes to get registered after the exam, so … Read more

check_http and SNI Hostnames

You may find you need to perform a check where the FQDN you are monitoring doesn’t correspond to the IP address and some form of virtual server (or host headers) are in use. Now normally using a command like: Should just work however in certain instances depending on the configuration of the web server you’ll … Read more

NMAP Port Scanning States

NMAP (Network Mapper) is a great tool for scanning your network to identify active hosts and the open/available services they have. NMAP provides quite a granular output for the port states, six in-fact, rather than just an open and closed. I’ll give a brief overview of the three main ones you’ll come across: Open, Closed … Read more

Separation of Duties, Two-Person Control, (Principle of) Least Privilege and Need to Know

Information Security has a number of foundational concepts, such as the Confidentiality, Integrity and Availability of information, information assets and services. In this article we’ll explore four key concepts that are good to understand to assist you in building and configuring secure systems and therefore protecting and improving the Confidentiality, Integrity and Availability of your … Read more

Monitoring Interface Status on Palo Alto Firewall

In this scenario I had a pair of Palo Alto Firewalls that were providing firewall services as a perimeter pair of firewalls acting in an active/passive cluster. Due to our internal network configuration, use of OSPF etc. the interfaces (ports) on the passive firewall were set to be down/disabled when that firewall was not active. … Read more

Tunnel Web Traffic via SSH Tunnel

Just a quick one, let’s say you need to tunnel some traffic over an SSH tunnel, its pretty simple to setup, in this example I’m wanting a local port 3128 on my local machine to be tunnelled over the SSH session to a remote server via another server (i.e. an SSH gateway). Okay, let’s break … Read more

Kerberos Basics

Kerberos is an authentication technology, if you’ve used Microsoft Windows and Active Directory (AD) you will have heard of Kerberos as its the authentication method used to secure an AD Domain and any hosts and devices that are joined to it. I’d like to provide a fairly high-level run through of how Kerberos works, so … Read more