Release the Kracken!

Got a WiFi baby monitor? Got a fancy WiFi kettle? Bought a smart TV with WiFi? How's that WiFi connection in the car working out for you? Because they are all very likely to be vulnerable to the KRACK (Key Reinstallation Attack) exploit: The exploit allows an attacker within proximity of a wireless client or access point … Continue reading Release the Kracken!


Setting Up PIA VPN In My Overly Complicated Network

After getting my hands on a WiFi Pineapple (a post on this to follow!) and enjoying exploring its features I quickly realised my mobile device is super promiscuous when it comes to joining open access points I'd previously connected too (Premier Inn, McDonalds etc). This got me started on looking into VPN solutions and after … Continue reading Setting Up PIA VPN In My Overly Complicated Network

DHCP Snooping, Dynamic ARP Inspection and IP Source Guard

With a client going for an ISO standard which dictates stringent controls over both the external and the internal network resources I decided to put in some additional controls to ensure confidentiality, integrity and availability of the internal network. As the client uses Cisco hardware on premise, this consisted of a trio of additional measures … Continue reading DHCP Snooping, Dynamic ARP Inspection and IP Source Guard

802.1x MAC Authentication Bypass (MAB) to an NPS Server

Continuing to build on earlier posts where we setup 802.1x to authenticate users and place them in predefined VLANs, then extended this to dynamically assign the VLAN, this post will look at what to do for devices that don't speak 802.1x such as printers etc. While there is a guest VLAN command for dot1x we could use … Continue reading 802.1x MAC Authentication Bypass (MAB) to an NPS Server

Securing Baby Monitors and Webcams

There has been quite a bit in the media lately about consumer grade webcams and Internet of Things (IoT) devices being used as a springboard for DDoS (Distributed Denial of Service) attacks on popular web services. This post is more aimed at the general consumer  as opposed to those who deal with IT in their … Continue reading Securing Baby Monitors and Webcams

Network Device Security Policies

Having recently dipped my toes into the security world with the Security+ exam I've been far more conscious about the risks to confidentiality, integrity and availability in my day to day work designing and supporting network infrastructure. In addition to this I found a very small mention to network device security policies in the back of … Continue reading Network Device Security Policies

Spoofing Attacks

In order to secure the internal network against threats you need to consider the tactic of presenting an attacking device as a trusted device in order to lull users into handing over credentials or files. An attacker can perform this in several ways, for example, by modifying their MAC address to mirror one of a target … Continue reading Spoofing Attacks

Sniffing Attacks

Just like sitting in a café and listening to other peoples conversations, sniffing the network involves passively capturing traffic as it flows through the network segment that an attacker is connected to. One common tool to capture traffic (often for legitimate reasons) is Wireshark, which is a freely available "protocol analyser", that will reveal what … Continue reading Sniffing Attacks

Hardening Internal Networks

Creating a LAN network can at first glance be quite straight forward. Simply buy some switches and connect all your users to them and then connected these switches to a single router. Yes, everything will work (so long as you've allowed for DHCP and so on), but the network will not be giving you 100% … Continue reading Hardening Internal Networks