Friday, May 30, 2025

🔒 Defending Your Network: Understanding and Preventing VLAN Hopping Attacks 🔒


 Virtual Local Area Networks (VLANs) are essential for segmenting network traffic to enhance security and performance. However, misconfigurations can expose networks to VLAN hopping attacks, where malicious actors gain unauthorized access to traffic on different VLANs.

The article from Internetworks delves into the two primary methods of VLAN hopping: switch spoofing and double tagging. Switch spoofing exploits the Dynamic Trunking Protocol (DTP) by tricking switches into forming trunk links, granting attackers access to multiple VLANs. Double tagging involves inserting two VLAN tags into a frame, allowing it to traverse VLAN boundaries undetected.

To mitigate these threats, the article recommends several best practices: disabling DTP on all access ports, configuring switch ports explicitly as access ports, avoiding the use of VLAN 1 for user traffic, enabling port security to restrict MAC addresses, shutting down unused ports, and implementing Private VLANs (PVLANs) for added isolation. Regular monitoring and auditing of VLAN configurations are also crucial in maintaining network security.

Click the image to read the full article

Wednesday, May 28, 2025

Free "Website Hacking Techniques" Course


 The "Website Hacking Techniques" course offered by EC-Council's CodeRed platform is designed to equip learners with practical skills in identifying and exploiting common web vulnerabilities. The course emphasizes hands-on experience, allowing participants to simulate real-world hacking scenarios and understand the methodologies employed by attackers. By engaging with these simulations, learners can gain insights into the tactics used to compromise websites and the importance of robust security measures.

Throughout the course, participants explore various tools and techniques essential for web application penetration testing. This includes understanding the intricacies of different attack vectors and how to effectively utilize tools to uncover and exploit vulnerabilities. The curriculum is structured to provide a comprehensive understanding of the web hacking landscape, ensuring that learners are well-equipped to assess and enhance the security posture of web applications.(EC-Council Learning)

By completing this course, individuals not only gain valuable knowledge in web security but also earn a certificate of completion from EC-Council. This certification serves as a testament to their proficiency in website hacking techniques and can be a valuable addition to their professional credentials. Whether you're an aspiring ethical hacker or a cybersecurity professional looking to deepen your expertise, this course offers a structured pathway to mastering the art of web application security.

click the image to attend

Tuesday, May 27, 2025

Mastering EdgeRouter Security: Why Command Line and GeoIP Blocking Are Game-Changers

 


Using the Command Line Interface (CLI) on #Ubiquiti EdgeRouters opens the door to powerful, fine-tuned control that the graphical UI simply can't match. Whether you're configuring advanced routing rules, managing firewall policies, or scripting automated tasks, the CLI provides a deeper, more efficient means of managing your network infrastructure. It enables network administrators to execute changes quickly, troubleshoot with precision, and unlock features that may not be accessible via the GUI—making it an indispensable tool for professionals seeking robust and scalable setups.

One of the most impactful security features you can implement via the CLI is GeoIP blocking. By filtering traffic based on geographic origin, administrators can dramatically reduce attack surfaces, blocking high-risk countries from accessing sensitive services like SSH, VPN, or remote management. When combined with the CLI, setting up GeoIP filtering becomes a flexible and powerful defense mechanism, protecting your network from unwanted intrusion while giving you granular control over who can connect and from where. This level of security customization is vital in today’s threat landscape, especially for SMBs and IT professionals managing remote access points.


Urls

EdgeRouter - Add Debian Packages to EdgeOS

https://help.uisp.com/hc/en-us/articles/22591219068055-EdgeRouter-Add-Debian-Packages-to-EdgeOS


EdgeRouter - How to Create a WAN Firewall Rule

https://help.uisp.com/hc/en-us/articles/22591166964119-EdgeRouter-How-to-Create-a-WAN-Firewall-Rule


Firewalling by country on Edgerouter

https://www.cron.dk/firewalling-by-country-on-edgerouter/


Ubiquiti EdgeRouter GeoIP Blocking Setup - How To

https://www.youtube.com/watch?v=Qn5hbdijYJM


Ubiquiti Edgerouter VPN Configuration

https://www.youtube.com/watch?v=Y9EkYniZH5k



Here are all the commands that I used in the video:

terminal length 0  

cat /var/log/charon.log | grep  init

show version

configure

set system package repository stretch components 'main contrib non-free'

set system package repository stretch distribution stretch

set system package repository stretch url http://archive.debian.org/debian

commit ; save

sudo apt-get update

sudo apt-cache search dnsutils

sudo apt-get install dnsutils

Test that the utilities successfully installed with the following command

sudo dig @8.8.8.8 google.com


sudo apt-get install wget

sudo apt-get install nano

set firewall group network-group countries_allowed description countries_allowed

To check that your firewall group was created from the CLI, type

show firewall group

commit

save

exit

mkdir /config/zonefiles

cd /config/scripts

 sudo nano country-load

---------------

#!/bin/bash

countryList=“ca"

firewallGroupName=countries_allowed


function loadcountry () {

        firewallGroupName=$1

        country=$2


        echo "Downloading country definition for $country..." >> /var/log/alex

        wget http://www.ipdeny.com/ipblocks/data/countries/${country}.zone -O /config/zonefiles/${country}.zone -q

        echo "Adding rules to firewall group $firewallGroupName..." >> /var/log/alex

        for rule in `cat /config/zonefiles/${country}.zone`; do

                ipset add $firewallGroupName $rule

        done

}


ipset -F $firewallGroupName

for country in $countryList; do

        loadcountry $firewallGroupName $country

done

---------------

sudo chmod 755 country-load

sudo ./country-load

sudo ipset -L countries_allowed

sudo ipset –L | grep ip address


sudo ipset add countries_allowed 24.138.184.164/20

sudo ipset del countries_allowed 24.138.184.164/20

 

 

show configuration commands | grep  ike | grep WAN_LOCAL

show configuration commands | grep  l2tp | grep WAN_LOCAL

 

configure

set firewall name WAN_LOCAL rule 30 source group network-group countries_allowed

set firewall name WAN_LOCAL rule 60 source group network-group countries_allowed

commit

save

exit


last point.. make sure you watch your firewall rule order..

Popular post