Apr 14, 2020
Posted in blog, Cloud, Encryption, Featured, Information Security, Quick Tips, Windows
Azure Security Best Practices – Part 1
Hello and welcome again!
This time around, I’ve decided to make this
blog post as a Part 1 of many several parts that will be released. There
is just too much Azure security information to put up in a single post. So, my
plan is to make multiple posts over time.
Azure has many great security features that not everyone may be aware of right from the start. This post will focus on some key areas of Azure, and how it can better enhance the security of the environment. Key focus will investigate security best practices for Azure.
Read more Of This Post
Dec 6, 2019
Posted in blog, Encryption, Featured, Information Security, pen testing, security awareness, Windows
Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell
This week, I was hanging out with a friends, who happened to
forget their Wi-Fi Password to connect a new device to their network. I
decided, I would find a way and help them out so they could obtain the Wi-Fi
password. It then led me to a thought, that a malicious attacker could
technically use the same technique. Or, that it could be a good technique used
when pen testing an environment. So, therefore, I have decided to make a blog
post about it. Enjoy!
Read more Of This Post!
Oct 19, 2017
Posted in Encryption, Information Security
When Organizations Do Not Use Email Encryption
For this article, I had originally written it a few months ago. However, I didn’t get the chance to post it at that time. And, in a fortunate and positive way it turns out that my post will be some what less relevant than originally intended for the readers. When I initially had started this article, I had noticed an issue which seems to crop up anytime I am working with an organization. Many important organizations still lack basic security tools and options. In the example of this article, it looks into the lack of use of email encryption and secure email systems.
Now before I get into the nitty gritty stuff I want to list out a disclaimer. Everything I conduct, list, and discuss on my blog is and has always been for educational purposes. None of my articles are made or should be used to attack machines out there. All information on my blog is for the better purpose of learning better security methods.
Disclaimer
Now this article is not meant to bash government organizations in any way what so ever. This article is here to teach that any and all types of organizations can easily lack basic security measures. (more…)
Sep 26, 2017
Posted in Encryption, Information Security
Hello everyone.
I am back with some more email security!
Today I’d like to talk about SMTP Authentication.
Some people may never have heard of this concept or may have simply ignored it as it seemingly may not feel that important.
However, in certain situations one may need to make use of SMTP Auth for email.
SMTP Authentication
SMTP Authentication – Outgoing Emails
As shown above in the diagram.
SMTP Auth is fairly simply to use for all incoming or outgoing emails.
Essentially, a machine has to authenticate with the central mail server.
The authentication can be done in various ways.
You can normally query LDAP, Active Directory, or some other identity management system as well as store the credentials on the mail server (not recommended).
How Does It Work?
(more…)
May 22, 2017
Posted in blog, Encryption, Information Security, The Internet Of Things
Network Security for IP Camera’s & Video Surveillance Systems
These days many devices have some form of interaction with our networking devices and the internet itself! What people forget is much like our desktops, laptops and mobile devices. All of these other types of devices need to be secured. The average person is going to assume no security is needed and that the product itself is already fairly secure by default. In my personally opinion, I’d say the default security settings are usually not sufficient enough to keep the device and your network safe.
I’ve created a guide below of procedures that can be followed to enhance the security measures for your IP Camera’s and systems.
IP Camera Hardening Guide
I’ve created a hardening guide below that will look at a few key components that administrators will want to make use of in their network.
- Passwords
- LDAP/AD Authentication
- VLAN’s
- 802.1X Authentication
- Disabling Network Ports
- Disabling Unused Services
- MAC Address Filtering
- Physical Access Control
(more…)