Skip to main content

Posts

Showing posts from May, 2022

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

The things that go wrong with your Internet connection

  There are multiple things that can and do go wrong with your Internet connection. Lets have a look: Power The first major issue is power. Power failures are common and and occur along any part of the Internet path and also at the end point. Data centres have sophisticated power backup systems that include generators and online uninterruptible power systems. These are pretty solid while on the home or business side that may not be the case. Along the path a service provide will have points of presence with varying degrees of power protection. Often there might be power backup but its poorly managed. As an example in our area, the ISP realizes the tank on his diesel generator is empty when the customers phone to complain about their links failing. They do not use any type of Internet of Things sensor to pro-actively manage the failures. Ironically, you'll find the significant majority of ISPs do not!

Brute shark

BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. Head over to github: Brute Shark

WiFi has changed: Is UniFi better than Cisco?

 

VPN slow? Network nightmares? How TCP really works: MTU vs MSS

   

Top Threats your Business Can Prevent on the DNS Level

The Domain Name System (DNS) is the underlying fabric that connects almost every gadget, service and endpoint in a company. And depending on how you manage your DNS landscape, it might be your IT security team’s guardian angel or when poorly managed your worst nightmare. Read the full article over at Threatpost:  Top Threats your Business Can Prevent on the DNS Level