Educate yourself on how to harden your own systems
Category: Application, Data, & Host Security

VLAN Configurations, Trunk Links, and 802.1q Encapsulation
A "VLAN" is short for a "Virtual Local Area Network." You can think of them just like an ordinary LAN where each LAN is its own subnet and broadcast domain; however, a VLAN is a virtual LAN. Take a look at the network design below. This is a 10.0.0.0/24 network, which gives us 1 subnet ...

PenTest Edition: Using Shodan to Locate Internet-Connected Devices (Webcams, Servers, Routers, and More)
With Shodan, there's no hiding on the Internet. Shodan is a search engine that allows users to locate devices that are connected to the Internet, such as webcams, routers, servers, traffic lights, baby monitors, SCADA systems, Internet of Things (IoT) devices, and so forth. Shodan began back in 2009 as a small project created by ...

The Recent 4G LTE Network Vulnerabilities and Attacks
In this blog post, I'll discuss the design and operation of a 4G LTE network. In hindsight, I realize topics such as these can get extremely lengthy. For that reason, I'll limit this discussion down to only the necessary technical details required to understand these new LTE attacks, while excluding any complicating, non-essentials. These new ...

Over 3,000 iOS and Android Apps Leak 100 Million User Sensitive Records via Misconfigured Firebase Backends
When building an app that needs to store and share data from a server, software developers can rely on Google's Firebase Realtime cloud-hosted database. This Infrastructure as a Service (IaaS) removes serious time constraints by providing app developers with maintenance and support, offline support, and real-time synchronization of data with clients in real-time. And, since ...

7 Ways to Respond to Network Threats
With the re-awakening of ransomware attacks that plagued many networks last year, cybersecurity is arguably at the top of every network administrator's priority list. With that being said, here are 7 ways to respond to network threats. 1. Network Segmentation In specific circumstances, network segmentation, which is a process by which we separate parts of ...