Skip to main content

Posts

Showing posts from 2015

What is Password Manager?

Why do we need a password manager? Today is the world of social media, online business trading, online banking hence creation of different password became a necessasity and remembering them become nightmare. Writing these passwords on pieee of paper and pasting those paper on desk became a common practice which became easy target for cyber criminals to sucessfuly launch cyber attack, credential theft, financial fraud etc. Having a universal user name and password is impossible .  As every site or service has its own password requirements and hence its practically it is hard to keep track of all your different passwords.  Help improve security posture by providing a secure way for password storage rather than storing passwords in plain text compromising security posture.  It’s unreasonable to expect any person to remember complex passwords.  Its better to have something rather than nothing.  A Password Manager is a software application that allows users to securely store and organize pa

TCPING - Cousin Brother of NMAP

TCPING is an utility written in GO language that operates similarly to PING however it works over a tcp port, This utility can be very useful for troubleshooting network connectivity and performance issue at Layer 3 and Layer 4. Support Windows, Darwin, Linux, Android, ios, Freebsd, Netbsd, Openbsd, Aix, Dragonfly, illumos, Plan9, Solaris and other operating systems.

Juniper SRX : Proxy ARP on Juniper SRX

Proxy ARP ( Address Resolution Protocol ) is a technique by which a intermediate network device like router replies to ARP request for a given IP address that is not part of local network.  The router acts as a proxy for the destination device to which the host wants to communicate and provides its own MAC address as the reply. Note: Proxy ARP can help devices on a network reach remote subnets without the need to configure routing or a default gateway. Disadvantages of Proxy ARP Proxy ARP can lead to security and performance issues on the network.  It poses a security risk by making the network vulnerable to ARP spoofinf attack. In attacks, malicious devices can impersonate proxies. Intercept or modify traffic between devices. It may introduce inconsistency into the network’s topology. Addressing scheme by concealing device locations and identities. Let see when and how proxy ARP is configured in Juniper by answering below questions which often comes to our mind When do you config