In my opinion, one of the best Telnet/Serial/SSH client is SecureCRT, that provides rock-solid terminal emulation for computing professionals, raising productivity with advanced session management and a host of ways to save time and streamline repetitive tasks. I recently had the need to import a hundred devices in SecureCRT, but I didn’t know how to do it. Surfing the web, I found a helpful python script to import it via CSV! Three components are required: SecureCRT (obviously), the script and the CSV file.
Recently, Fireeye researchers have discovered a new type of malware implant in Cisco router that allows attackers to gain and keep access to these devices. The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet. The implant also provides unrestricted access using a secret backdoor password.
Like every year, Cisco has released the Midyear Security Report. This paper is written to understand how attackers are evolving their techniques to evade defenses, using stealthy tactics based on agility, speed, adaptation, and even destruction. New threat intelligence and trend analysis reveal how attackers use stealthy tactics based on agility, speed, adaptation, and even destruction. During this year, adversaries continue to innovate as they slip into networks undetected and evade security measures:
During my CCIE R&S studies (CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1), I have discovered an unexpected behavior of the static port channel: a Layer2 loop! Obviously, in order for that happen, several things must happen. Suppose to have three switches: The Ciscozine-ROOT switch, as the word suggest, is the root bridge (priority 4096); the Ciscozine-ROOT_SEC is the “backup root bridge” (priority 8192), while the Ciscozine-SW has the default priority.
In June 30, 2015 at 23:59:60 UTC, one minute will have 61 seconds when a leap second is added; the reason we have to add a second every now and then, is that Earth’s rotation around its own axis, is gradually slowing down, although very slowly. This will be the 26th leap second adjustment since 1972, and represents an important consideration for providers of computing, networking, and software solutions.
Cisco today announced that its Board of Directors has appointed Chuck Robbins as Chief Executive Officer effective July 26, 2015. In his previous role as Senior Vice President of Worldwide Field Operations for Cisco, Chuck Robbins has led the company’s Worldwide Sales Organization and Worldwide Partner Organization. John Chambers, who has led Cisco as its CEO for 20 years, will become the company’s executive chairman. “This is the perfect time for Chuck Robbins to become Cisco’s next Chief Executive Officer. We’ve selected a very strong leader at a time when Cisco is in a very strong position,” said Cisco Chairman and […]
A good network engineer must react quickly during a fault. On the market, there are several solutions to monitor the network malfunctions: HP Openview, Solarwinds, PRTG and other solutions (open source or not). Generally, when an alert/warning is detected an event is triggered: email, SMS or text to a monitor. But why don’t you send these messages via whatsapp? It’s free and can reach everyone, everywhere! What you need: PHP with openssl extension enabled WART WhatsAPI-Official SIM In this tutorial, I use XAMPP Portable version 1.8.3 (http://sourceforge.net/projects/xampp/) on a Windows7 64bit machine. Note: The WhatsAPI-Official requires openssl extension enabled in the PHP settings; whitout this library the script cannot work! […]
On Tuesday January 27, 2015, Qualys security researchers discovered the GHOST vulnerability (CVE-2015-0235), a serious weakness in the Linux glibc library, that allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. This vulnerability affects the functions gethostbyname() and gethostbyname2() functions originally used to resolve a hostname to an IP address. However, these functions have been deprecated for approximately fifteen years, largely because of their lack of support for IPv6. The superseding function is getaddrinfo() which does support IPv6 and is not affected by this buffer overflow. Programs that still utilize the deprecated […]
In the last article, I explained how to configure the Cisco 6500 in VSS configuration, but how does the VSS reacts during a failure? There are three possible scenarios: Link failure within a multichassis Cisco etherchannel link Active supervisor engine failure VSL failure Scenario #1: Link failure within a multichassis Cisco etherchannel link Availability is not affected for those data flows that do not use the failed link. For those traffic flows that use the failed link, the effect consists of the time it takes to detect the link failure and reprogram the indices within the system.
Like every year, Cisco has released the Annual Security Report that is one of the preeminent security reports that examines the latest threat intelligence, providing industry insights, trends and key findings revealing cybersecurity trends. During this year, attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity. Security teams, must be constantly improving their approach to protect their organization from these increasingly sophisticated cyber attack campaigns.
- Pro PoS — This Stealthy Point-of-Sale Malware Could Steal Your Christmas: The point of Sale systems a... https://t.co/CFbMkASYAg #hackers
- WhatsApp Blocks Links to Telegram Messenger (Its biggest Competitor): It seems like Facebook-owned po... https://t.co/Ysazvg114f #hackers
- Toymaker VTech Hack Exposes 4.8 Million Customers, including Photos of Children: Earlier this month, ... https://t.co/io9pKxJDCb #hackers
Enter your email address to receive notifications of new posts.