Skip to main content

Posts

CapTipper – Malicious HTTP Traffic Explorer

CapTipper is a Python tool independently developed by one of checkpoint researchers, Omri Herscovici, which is used to analyze, explore and revive HTTP malicious traffic. It provides the security researcher with easy access to the files and understanding of the network flow, and is useful for researching exploits, as well as various pre-conditions, versions, obfuscations, plugins and shellcodes.

What is Password Manager?

Why do we need a password manager? Today is the world of social media, online business trading, online banking hence creation of different password became a necessasity and remembering them become nightmare. Writing these passwords on pieee of paper and pasting those paper on desk became a common practice which became easy target for cyber criminals to sucessfuly launch cyber attack, credential theft, financial fraud etc. Having a universal user name and password is impossible .  As every site or service has its own password requirements and hence its practically it is hard to keep track of all your different passwords.  Help improve security posture by providing a secure way for password storage rather than storing passwords in plain text compromising security posture.  It’s unreasonable to expect any person to remember complex passwords.  Its better to have something rather than nothing.  A Password Manager is a software application that allows users to securely store and organize pa

TCPING - Cousin Brother of NMAP

TCPING is an utility written in GO language that operates similarly to PING however it works over a tcp port, This utility can be very useful for troubleshooting network connectivity and performance issue at Layer 3 and Layer 4. Support Windows, Darwin, Linux, Android, ios, Freebsd, Netbsd, Openbsd, Aix, Dragonfly, illumos, Plan9, Solaris and other operating systems.

Juniper SRX : Proxy ARP on Juniper SRX

Proxy ARP ( Address Resolution Protocol ) is a technique by which a intermediate network device like router replies to ARP request for a given IP address that is not part of local network.  The router acts as a proxy for the destination device to which the host wants to communicate and provides its own MAC address as the reply. Note: Proxy ARP can help devices on a network reach remote subnets without the need to configure routing or a default gateway. Disadvantages of Proxy ARP Proxy ARP can lead to security and performance issues on the network.  It poses a security risk by making the network vulnerable to ARP spoofinf attack. In attacks, malicious devices can impersonate proxies. Intercept or modify traffic between devices. It may introduce inconsistency into the network’s topology. Addressing scheme by concealing device locations and identities. Let see when and how proxy ARP is configured in Juniper by answering below questions which often comes to our mind When do you config

Generic Routing Encapsulation (GRE) Simplied for Network Pro

Encapsulation is a kind of  mechanism that transport packets of one type of protocol within another protocol. The protocol that is been carried is called as the Passenger Protocol , and the protocol that is used for carrying the passenger protocol is called as the Transport Protocol .