Like every year, Cisco has released the Annual Security Report that is one of the preeminent security reports that examines the latest threat intelligence, providing industry insights, trends and key findings revealing cybersecurity trends. During this year, attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity. Security teams, must be constantly improving their approach to protect their organization from these increasingly sophisticated cyber attack campaigns.
The Cisco Catalyst 6500 Series Virtual Switching System (VSS) allows the clustering of two chassis together into a single, logical entity. This technology allows for enhancements in all areas of network design, including high availability, scalability, management, and maintenance. The Virtual Switching System is created by converting two standalone Catalyst 6500 systems to a Virtual Switching System. The conversion is a one-time process that requires a few simple configuration steps and a system reload. Once the individual chassis reload, they are converted into the Virtual Switching System. All control plane functions are centrally managed by the active supervisor engine of the active virtual […]
Unlike my technical articles about configurations, protocols and so on, in this tutorial I will explain how to log automatically all SecureCRT sessions. For those that are unaware, SecureCRT is one of the best SSH/telnet client. The question is “why save everything?” In my opinion, a good approach to work with many devices (network, security, …) is to save everything (show command, configuration command and so on..). This method gives several benefits, for instance when: The telnet/SSH client buffer is full Something goes wrong You mistakenly close SecureCRT You want to check what you have done
Recently, the Red Hat team have found a critical remotely exploitable vulnerability in the Bash (aka the GNU Bourne Again Shell), that allow a remote attacker to inject arbitrary commands. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash […]
In the article “How to save configurations using SNMP“, I have explained how to get the Cisco configuration using SNMP. Now, I explain how to send commands via SNMP using the “ciscoConfigCopyMIB” MIB; with this MIB, you can replace running/startup configuration, send commands, save the “show” output or reload the device. OK, let’s start :) First of all, check if your PC/Server has the SNMP suite; if not, install the net-snmp software (http://net-snmp.sourceforge.net/).
One of the task of a good Network engineer is update the Cisco IOS to avoid bugs and to have new features; but what is the correct procedure to upgrade a Cisco stack, for instance two 2960 switches in stack? There are two main methods to upgrade the IOS: TAR image BIN image TAR image The .tar file is an archive file from which both the IOS image and the CMS files are extracted during the upgrade process. If you want to manage switches or clusters of switches through a web interface (HTML), this is the only file you need to download.
Generally to upgrade/downgrade an IOS, you use the classical ftp/tftp transfer from a laptop to a router/switch; unfortunately, there are some cases where this way is not possible, so the only solution is to use the console. Suppose you have to upload an image of about 20Mb. On a 9600bps intereface, the time required to upload this image is about 35minutes (20000000/9600)! Oh my God! Fortunately Cisco permit to change the console speed using the command “speed”. By default the console interface works at 9600bps: Ciscozine#sh line console 0 Tty Line Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int […]
The Cisco Product Security Incident Response Team (PSIRT) has published nine important vulnerability advisories: Cisco IOS Software SSL VPN Denial of Service Vulnerability Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks Denial of Service Vulnerability Cisco IOS Software Network Address Translation Vulnerabilities Cisco AsyncOS Software Code Execution Vulnerability Cisco Small Business Router Password Disclosure Vulnerability Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Cisco Prime Infrastructure Command Execution Vulnerability Unauthorized Access Vulnerability in Cisco Unified SIP Phone 3905 Multiple Vulnerabilities in Cisco IPS Software Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability Cisco UCS Director Default Credentials Vulnerability
The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Cisco TelePresence ISDN Gateway D-Channel Denial of Service Vulnerability Cisco TelePresence System Software Command Execution Vulnerability Cisco TelePresence Video Communication Server SIP Denial of Service Vulnerability Multiple Vulnerabilities in Cisco Secure Access Control System Undocumented Test Interface in Cisco Small Business Devices
- Twitter Bomb Thread Forced Two Passenger Air planes To Emergency Landing: On Twitter account holder ... http://t.co/jATdAagWl1 #security
- Police Using High-Tech Device to See Through Walls Warrantlessly: We are all aware of the mass survei... http://t.co/BWgwVix6BS #hackers
- Cyber Suicide was Averted by Greece Police Cyber Crime Unit: Greece Police Cyber Crime Unit innovati... http://t.co/38XgYQWqeg #security
Enter your email address to receive notifications of new posts.