Wednesday, June 29, 2022

CORE-IT PROS – Mike and his Fire Extinguisher

 One of the highlights of working with Mike Pennachi and Laura Chappell on the Core-It Pros conference is learning new tips, tricks and sharing experiences.


I always find it fascinating that even though Mike, Laura and I have similar backgrounds, we have totally different stories to put a point across. Regardless of the story specifics, we do tend to agree on many of the basic points of troubleshooting and problem analysis. Its just that we have 3 different ways of getting there.


In this video Mike explains why he had a fire extinguisher on his desk.


Attend the www.COREITPROS.com conference with Laura Chappell, Mike Pennachi, Tony Fortunato August 22 - 26, 2022



Monday, June 27, 2022

CORE-IT PROS - Tech Tips - Wireshark Shortcut

 As part of the Core-it Pros conference (www.coreitpros.com) we will have a lot of Tech Tips available for the attendees. These Tech Tips are short tactical videos and written pieces that provide the attendees with more tips, tricks, and techniques that they can add to their toolbox. These Tech Tips, in combination with the Workshops, Labs, Case studies, and General sessions will give the attendees plenty of skills to use when they get back to work.

This video is an example of the Tech Tips you can expect during the event. Tony shows you how to create a shortcut on your desktop.



Wednesday, June 22, 2022

CORE-IT PROS – Trying to Help

 Some people might think that walking into an unfamiliar network, with unfamiliar staff to work on an issue that has them stumped is easy. I know it’s a no-brainer when I word it that way, but that is exactly what it is like for external consultants with every engagement.

There are many layers of issues to address when you first walk into a client site but the number one priority for me is to ensure the I.T. staff understand that I am here to help. Many times I explain that the only way I can identify the root cause is with their help since I am not familiar with their network.

In this video, Laura Chappell talks about this exact issue which also helps when you work with various other departments, divisions, or subsidiaries within your current place of work.

Attend the www.COREITPROS.com conference with Laura Chappell, Mike Pennachi, Tony Fortunato August 22 - 26, 2022



Monday, June 20, 2022

IOT DNS Analysis

 Attend the www.COREITPROS.com conference with Laura Chappell, Mike Pennachi, Tony Fortunato August 22 - 26, 2022


IOT devices are being added to networks at a blistering pace. Everything from smart plugs, light switches, light bulbs, appliances, thermostats, video doorbells, cameras, and many more.

In many cases, the installation procedure is simple; plug it in, pray, and it ‘should’ work. If it doesn’t, try it again and if that fails, blame the network because it worked at home.


When it comes to corporate environments there are so many things that can prevent a device from getting internet access. If you're lucky it will be something trivial like a TCP/UDP port number being blocked. Other times it becomes a more involved troubleshooting exercise and could be an IP address/DNS name is blocked or flagged as suspicious.


In this video, I take a trace of an Ethernet-attached camera and walk you through how I filtered out the camera traffic and what value we can get from the DNS requests made by it.




Thursday, June 16, 2022

How Network Firewalls Promote Open Source Security (by Gilad David Maayan)

 What Is a Firewall?

A network firewall is a firmware or software that monitors traffic and prevents unauthorized access to a network. It uses predetermined rules when inspecting incoming and outgoing traffic to identify and block threats. 


Firewalls are an essential part of network security in the client-server model, which is the central architecture of modern computing. They are installed on personal devices and enterprise networks and built-into Windows, Linux, and Mac computers. 

What Is a Next-Generation Firewall (NGFW)?
A next-generation firewall (NGFW) enforces security policies at the port, protocol, and application levels that enable it to detect and block sophisticated attacks. NGFWs provide additional context to the firewall's decision-making process, equipping the firewall with the ability to understand web application traffic in detail as it passes and take action to block suspicious traffic.

Common NGFW features include application and identity awareness, bridged and routed modes, integrated intrusion prevention systems (IPS), and connectivity with external intelligence sources. 


Open Source Security Risks
Open source is used in a majority of enterprise software projects and applications. It creates amazing efficiencies, but also represents new risks for organizations. Here are some of the major risks that raise the need for robust open source security.


Vulnerabilities Are Public Knowledge
Once open source contributors discover vulnerabilities, they disclose the information to the public. In addition to contributors, other organizations make information about vulnerabilities publicly available, such as the National Vulnerability Database (NVD) and the Open Web Application Security Project (OWASP).

The main challenge here is that not only users of the open source components learn about the vulnerabilities but also threat actors. Developers and organizations who are part of the project’s community get advanced warnings before the vulnerability is made public to NVD and OWASP. The rest learn about it when it’s publicly disclosed, and need to quickly update to a parched version before threat actors can exploit the vulnerability.


Operational Risks
Open source components can cause various operational inefficiencies that introduce significant risk. For example, failure to track open source components during automated software deployments can cause critical security issues, because organizations may not be aware they are deploying vulnerable components into production systems. 

In some cases, open source components are safe at the time of deployment, but zero day vulnerabilities are discovered later and attackers may strike before the organization can update its libraries.

You can address this issue by keeping an inventory of all open source components across the entire pipeline. An inventory introduces visibility and transparency. You can use it with a policy that defines open source usage and employ software composition analysis tools to enforce this policy automatically.

In addition to monitoring components for updates, you should also keep an eye on the entire project. Some projects begin with an active community but eventually become inactive as there is no one to update them. Using these projects as libraries or frameworks requires more work as you need to fix any future vulnerabilities and take responsibility because there are no community contributors to release patches.


Lack of Integrity
Open source projects typically do not provide warranties that guarantee security, content, or support. This is because open source projects are supported by volunteers, who can stop work on the project at any time. These volunteers are also the ones who evaluate the software for any security issues and offer support through forums—but this is all voluntary work, and they are not obligated to continue it indefinitely. They are also not held liable for faulty guidance.


Another challenge is that anyone can contribute to the project, which means contributors are not required to reveal their real identities. As a result, it can be difficult to verify that the contributed code is original and not taken from a certain third-party source with established intellectual property (IP) rights. If you use open source components that are found to contain code with infringed rights, you can be accused of infringement.


How NGFW Can Prevent Open Source Vulnerabilities
When attackers exploit open source vulnerabilities, they almost always do so by transmitting malicious payloads over a network. This could be malware that attackers attempt to deploy on the network, or command and control (C&C) communications performed by malware already running inside the network. NGFW can help by identifying these communications and blocking them.

All data transmitted over the Internet or other network is segmented into small pieces known as packets. These packets contain all content coming into the network. The network firewall inspects the packets and allows or blocks them to stop the entrance of malicious content (such as malware attacks) into the network. Every firewall has packet filtering capabilities.

Packet filtering involves examining each packet's source and destination IP addresses, protocols, and ports. That is, the firewall investigates each packet's origin, destination, and transmission method and allows or blocks packets based on this information. This approach filters out suspicious packets.

NGFW uses an improved version of packet filtering called deep packet inspection (DPI). Like packet filtering, DPI examines each packet's source and destination ports, IP addresses, etc. The packet contains all this information in the Layer 3 and 4 headers.

However, DPI also examines each packet's body, inspecting it for threat indicators like malware signatures and comparing the packet's contents with known malicious packets.

The DPI feature of NGFW usually includes intrusion prevention capabilities, often in the form of an Intrusion Prevention System (IPS). These analyze incoming traffic, identify potential and known threats, and block confirmed threats. 

IPS can detect threats using a variety of methods, including:

Signature detection—retrieves information from incoming packets and compares them to known threats.

Statistical anomaly detection—scans traffic to detect abnormal behavioral changes.

Stateful protocol analysis detection—scans traffic (like statistical anomaly detection) but focuses on the network protocol used and compares it to the normal protocol usage.

Threat intelligence is actionable information about potential exploits. Up-to-date threat intelligence is critical to stopping advanced attacks, given the ever-changing attack methods and malware types. NGFW receives and responds to feeds from external threat intelligence sources.

Threat Intelligence provides up-to-date malware signatures to maintain IPS signature detection effectively. It can also provide insights into an IP's reputation, identifying IP addresses associated with frequent attacks, especially bot attacks. IP reputation feeds provide information on the current known malicious IP addresses, enabling the NGFW to block them.


Conclusion
In this article, I explained the basics of open source security and showed how NGFW can help promote a safer open source ecosystem. When organizations deploy NGFW, they have a robust way to intercept and block malicious communication, both inbound and outbound on their networks. This can be a critical defense against many exploits of open source vulnerabilities. As soon as attackers attempt to send malware over the network or communicate with C&C servers, the NFGW can identify and block these communications.

Network-level protection is an important line of defense against open source vulnerabilities, but is not enough. There is no replacement for scanning open source components, detecting vulnerabilities, and remediating them as a preventive measure. By combining preventive measures with a last line of defense at the network layer, organizations can ensure they have robust protection against open source security threats.

Wednesday, June 15, 2022

CORE-IT PROS - Ethernet jokes

 for those of you who wonder what Laura Chappell, Mike Pennachi and Tony Fortunato chat about, well networking, packets and terrible ethernet jokes.

Here's a bit of fun from one of their many calls and 2 jokes you might find amusing..

Attend the www.COREITPROS.com conference with Laura Chappell, Mike Pennachi, Tony Fortunato August 22 - 26, 2022



Monday, June 13, 2022

IP Camera nmap and Connect

 Attend the www.COREITPROS.com conference with Laura Chappell, Mike Pennachi, Tony Fortunato August 22 - 26, 2022

In this video we review some packets and then I show you how I used nmap to determine what ports are open.

It is becoming more common for vendors to avoid using standard port numbers like 80, 23, 443, etc. when this happens, you might be forced into using the vendors ‘discovery’ or ‘management’ software.

In this example, this camera vendor randomizes the http port number when the camera is configured for DHCP (default). I also noticed that even if I reconfigure the http port number, it still randomizes it as long as dhcp is still enabled.

Configuring a static ip address took care of this issue and now the static http port number is remembered. I thought you would like to read about how I figured out the http port number to access. I reached for another tool in my toolbox; ‘nmap’ (https://nmap.org/). I use nmap to perform subnet and udp/tcp port scans.



Friday, June 10, 2022

The #PACE Process for Early Career Success by Mark Zides - A Review

 

The early phase of my own career transpired about 50 years ago, and while some of the basics of success remain the same, the emergence of things like search engines, social media, and the hybrid office have altered the landscape. The #PACE Process for Early Career Success by Mark Zides is up to date with the latest, including the new post-COVID workplace and the implications of the Great Resignation. Companies aren’t seeking employees who can fish out a handy pocket guide whenever a crucial decision must be made – they want people whose instincts lead them to a reserve of accumulated knowledge with which they can move confidently forward. This book begins by making it refreshingly clear it is not just another checklist for success by someone who has “been there, done that” – the focus is on thinking outside the book to cultivate a mindset for success.


The PACE acronym is an effective roadmap for the basic elements of Mark’s advice (Prepare, Apply, Commit, Evaluate), and the book is organized along these topics. Each of us is unique, and the modern workplace is a labyrinth of vastly different situations. The value of #PACE is built on cultivating the right frame of mind to deal with whatever circumstance may present itself.


The average corporate job today attracts 250 applicants - standing out in this crowd is challenging, especially in a world where AI and automated resume screening are using seemingly opaque algorithms to reject people. In the first three chapters, the author lays out a plan to prepare for this first phase of the job-hunting battle. The job market is no place for snowflakes (i.e., entitled, oversensitive people) and it is crucial to remain open-minded and willing to grow. Your own unique assets can be leveraged with new connections built from scratch, but it takes time and experience to develop this skill. Part of developing the proper mindset for this difficult and frustrating career phase is to start with some soul-searching on what really motivates you.


As many as 80% of job openings are never posted and of those that are, some are only there to satisfy an internal company policy. All of this further emphasizes what we should have already known; networking is essential to getting a job. At this point, Mark addresses the elephant in the room – those who are socially awkward or introverted. He offers encouragement with advice to practice a script, train your body language, and build an overall approach and mindset that will foster networking.


The following three chapters are devoted to “Apply”- the process of building and marketing “The Brand of You.” Job postings these days are a lot more detailed than when I started my first professional career search, and the more boxes an applicant checks, the better their chances of getting hired. Trying to game that resume screening system could look obvious and get you disqualified. As always, companies don’t care much about your personal goals and aspirations but are more concerned with what you can do for them and how quickly you can do it. In the post-COVID hybrid workplace, companies focus on individuals who are self-motivated and exhibit excellent communications skills.


Most of the book’s interviewing advice is fairly standard. Mark does provide some unique interview questions (I’ll probably use some of these the next time I interview a candidate). Companies were already trying to reduce travel expenses prior to the COVID pandemic, and online interviews are now common. A good tip here was to locate the little window with your interviewer as near as possible to your camera, so it will appear that you are making eye contact with them and not staring off into space.


Interviews are difficult enough to come by, and it’s easy to become convinced that your performance over a few hours will determine your entire future success or failure. The author is clearly successful and self-confident, and he offers some solid counseling for those whose positive mindset is not yet fully developed. This quote from Winston Churchill summarizes it best - “Success consists of going from failure to failure without loss of enthusiasm.” Whether or not you are hired, there are always lessons to be learned and opportunities to be found in failure.


The third element of #PACE, “Commit”, contains some good advice for after you’ve landed that job offer. Beyond the etiquette of rejecting and accepting offers, there is one excellent piece of advice that many of us overlook – “Read the contract.” Resist the temptation to trade off present experiences for future opportunity. More companies are tempting employees with unlimited vacation, but it’s interesting to note that people tend to work more rather than less in this situation.


It's easy to fall into the trap of letting jobs control your career. Life is in session, and a steady income with benefits will always be compelling. In the final group of chapters, Mark shares some enlightening stories from his own career. It may take a while to figure out what really motivates you and makes you happy, and the road to success will surely have many cross-roads. While we tend to pick the devil we know over the one we don’t, it’s important to keep your overall career goals in sight. If you do decide to leave, how gracefully you do so will influence your brand.


The “Evaluate” element of #PACE is all about self-reflection on your true passions, both for choosing the best career path and staying motivated to get there, i.e., “keeping PACE.” Jumping on the entrepreneur train is always a major draw, and Mark furnishes the reader with a nice checklist to help decide if this is really the right move. As in every step of #PACE, it’s critical, though not always easy, to be honest with yourself.


While the title targets those in the early phase of their career, PACE will benefit anyone, regardless of experience. My fifty years in the workplace have taught me many of the things that the author organizes and clearly explains. As for the things that have changed since my own early job searches, Mark’s ideas are current and well presented. The PACE steps at the end of each chapter are a handy reference – they should be on sticky notes on your desk if you are beginning a career. The book acknowledges that some folks are shy, unconfident or easily discouraged, and provides tips for slowly crafting a confident mindset. Ultimately, PACE is not a checklist to be followed, but a change in how you think and live that will set you up for success; the earlier, the better.



Author Profile - Paul W. Smith - leader, educator, technologist, writer - has a lifelong interest in the countless ways that technology changes the course of our journey through life. In addition to being a regular contributor to NetworkDataPedia, he maintains the website Technology for the Journey and occasionally writes for Blogcritics. Paul has over 40 years of experience in research and advanced development for companies ranging from small startups to industry leaders. His other passion is teaching - he is a former Adjunct Professor of Mechanical Engineering at the Colorado School of Mines. Paul holds a doctorate in Applied Mechanics from the California Institute of Technology, as well as Bachelor’s and Master’s Degrees in Mechanical Engineering from the University of California, Santa Barbara.



Popular post