search
top
Currently Browsing: Encryption

Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell

Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell

This week, I was hanging out with a friends, who happened to forget their Wi-Fi Password to connect a new device to their network. I decided, I would find a way and help them out so they could obtain the Wi-Fi password. It then led me to a thought, that a malicious attacker could technically use the same technique. Or, that it could be a good technique used when pen testing an environment. So, therefore, I have decided to make a blog post about it. Enjoy!

Read more Of This Post!

When Organizations Do Not Use Email Encryption

When Organizations Do Not Use Email Encryption

For this article, I had originally written it a few months ago. However, I didn’t get the chance to post it at that time. And, in a fortunate and positive way it turns out that my post will be some what less relevant than originally intended for the readers. When I initially had started this article, I had noticed an issue which seems to crop up anytime I am working with an organization. Many important organizations still lack basic security tools and options. In the example of this article, it looks into the lack of use of email encryption and secure email systems.

Now before I get into the nitty gritty stuff I want to list out a disclaimer. Everything I conduct, list, and discuss on my blog is and has always been for educational purposes. None of my articles are made or should be used to attack machines out there. All information on my blog is for the better purpose of learning better security methods.

Disclaimer

Now this article is not meant to bash government organizations in any way what so ever. This article is here to teach that any and all types of organizations can easily lack basic security measures. (more…)

SMTP Authentication

Hello everyone.

I am back with some more email security!

Today I’d like to talk about SMTP Authentication.
Some people may never have heard of this concept or may have simply ignored it as it seemingly may not feel that important.

However, in certain situations one may need to make use of SMTP Auth for email.

SMTP Authentication

SMTP Authentication - Outgoing Emails

SMTP Authentication – Outgoing Emails

 

As shown above in the diagram.

SMTP Auth is fairly simply to use for all incoming or outgoing emails.

Essentially, a machine has to authenticate with the central mail server.

The authentication can be done in various ways.

You can normally query LDAP, Active Directory, or some other identity management system as well as store the credentials on the mail server (not recommended).

How Does It Work?

(more…)

Network Security for IP Camera’s

Network Security for IP Camera’s & Video Surveillance Systems

These days many devices have some form of interaction with our networking devices and the internet itself! What people forget is much like our desktops, laptops and mobile devices. All of these other types of devices need to be secured. The average person is going to assume no security is needed and that the product itself is already fairly secure by default. In my personally opinion, I’d say the default security settings are usually not sufficient enough to keep the device and your network safe.

I’ve created a guide below of procedures that can be followed to enhance the security measures for your IP Camera’s and systems.

IP Camera Hardening Guide

I’ve created a hardening guide below that will look at a few key components that administrators will want to make use of in their network.

  • Passwords
  • LDAP/AD Authentication
  • VLAN’s
  • 802.1X Authentication
  • Disabling Network Ports
  • Disabling Unused Services
  • MAC Address Filtering
  • Physical Access Control

(more…)

Public Wi-Fi Security

Public Wi-Fi Security

Today in our current world we have access to free public wifi practically around ever corner street. Most cafes and restaurants offer free public WiFi to just about anyone. What people fail to realize is that technology is no different in the public compared to people being in public.

Let’s create a real life use case. You could be taking a nice stroll down at your local park. When someone comes by and starts taking photo’s of you and others at the park. They know have “access” to an image of you without your knowledge. But, (more…)

« Previous Entries

top