grand!
Thursday, 2 January 2014
Wednesday, 11 September 2013
Pyrit -WPA/WPA2-PSK Epic Fail-
Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA and OpenCL, it is currently by far the most powerful attack against one of the world's most used security-protocols.
WPA/WPA2-PSK is a subset of IEEE 802.11 WPA/WPA2 that skips the complex task of key distribution and client authentication by assigning every participating party the same pre shared key. This master key is derived from a password which the administrating user has to pre-configure e.g. on his laptop and the Access Point. When the laptop creates a connection to the Access Point, a new session key is derived from themaster key to encrypt and authenticate following traffic. The "shortcut" of using a single master key instead of per-user keys eases deployment of WPA/WPA2-protected networks for home- and small-office-use at the cost of making the protocol vulnerable to brute-force-attacks against it's key negotiation phase; it allows to ultimately reveal the password that protects the network. This vulnerability has to be considered exceptionally disastrous as the protocol allows much of the key derivation to be pre-computed, making simple brute-force-attacks even more alluring to the attacker. For more background see this article on the project's blog.
https://code.google.com/p/pyrit/
Monday, 2 September 2013
R77 is now available!
It seems to be the best one ever.
What's New in R77
New Threat Emulation Software Blade
The new Threat Emulation Software Blade blocks attacks which cannot be detected by signatures. It opens inspected files inside secure emulation environments to detect malicious behavior. It can be deployed as a cloud service or as a private (local) cloud.
New Check Point Compliance Blade
This new Software Blade analyzes your environment for compliance with major regulations and international standards. Check Point Compliance Blade generates detailed reports, with best practice recommendations taken from the large Check Point library. Check Point Compliance Blade sends alerts for policy changes that can affect compliance.
HyperSPECT Technology
Improvements to deep packet inspection engines boost performance for IPS and for Application and URL Filtering Software Blades Software Blades.
- Supports SMT (Hyper-Threading)
- Optimizations to DPI engines including streamers, parsers and pattern matching engines
Gaia Operating System Enhancements
- Centrally manage basic network configuration
- Back up and restore, run scripts, remote shell, and more, from a central console
- Synchronize cluster members with Gaia OS configuration cloning
Enhanced Gaia Software Updates
Update the Gaia operating system with the enhanced Automated Software Updates tool:
- Clean install of full image and upgrade of optimally sized package from the Check Point Cloud
- Up to 90% less downtime for Security Gateway upgrade
- Export and import of Gaia software update packages
- New WebUI features with enhanced usability
Enhanced Identity Awareness
- New identity acquisition method: RADIUS Accounting
- Automatic update of LDAP group membership changes
- Improved Identity Agent installation, with support for repair tools
- New MSI configuration tool for Agent distribution
...
a lot more at;
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92965
Thursday, 29 August 2013
Sending Syslog flow to an External Log Server
Dear Checkpoint Fellows and Followers,
Syslog data is possible to be sent as shown in sk33423, however only from physical boxes.
If you have VSX infrastructure, it is not possible to send syslogs of each vsx customer to another syslog server. All and all..
Sincerely.
Friday, 2 August 2013
Check Point R75.47 Released!
The release notes and the resolved issues, it’s mainly a maintenance or bug fix version.
There are a lot of fixed bugs.
It would be good to install the version firstly within the test environment, and then get it into production a.s.a.p.
Wednesday, 31 July 2013
License Info Tool / Checkpoint
License Tool for Checkpoint. I found it pretty useful actually as the license issues seem complicated most often. My Products > License Info Tool.
Sunday, 21 July 2013
Fortinet Upgrade Procedures
The upgrade processes have usually been a issue with Check Point. However, it is unbelievably easy for security vendor Fortinet (even in the cluster env.)
- .out file is downloaded from the support site.
- it is uploaded through GUI.
then, all process goes on automatically; firstly the active member is upgraded with losing 4 - 6 ping packets, and then 2-3 ping lost while upgrading the second member.
I suppose the reason is truly the architecture difference behind these boxes.
Monday, 13 May 2013
Friday, 22 February 2013
Network Troubleshooting - Cisco Packet Flow
To be or not to be.
Incoming or Outgoing Packets, sometimes understanding these two subjects are very vital in troubleshooting process.
Incoming or Outgoing Packets, sometimes understanding these two subjects are very vital in troubleshooting process.
ip
access-list extended gre-debug-out
permit gre
any any log // optional
permit ip
any any log
ip
access-list extended gre-debug-in
permit gre
any any log // optional
permit ip
any any log
interface
GigabitEthernet0/1
ip
access-group gre-debug-in in
ip
access-group gre-debug-out out
Here it is;
show ip access-list gre-debug-in
show ip access-list gre-debug-out out
Here it is;
show ip access-list gre-debug-in
show ip access-list gre-debug-out out
believe me you will like the result..
:)
Subscribe to:
Posts (Atom)