It is very important to keep your Checkpoint environment monitored. Given that it offers a wide variety of SNMP data, I have collected some of the (in my opinion) most useful OIDs MIBs. Altough I use Icinga and Grafana (as you can see the related outputs in this post), almost any monitoring system can be used to get … Read more
If you are in process of securing your web server or site, there are some tools and online resources that can help us a lot (in one of the following posts will show you some of them).
But simply using the command the fantastic nmap tool, another interesting feature is listing the available cipher suite certain site offers using the … Read more
Running a top directly on the VSX, I delimited the high to one of the virtual systems that runs on that VSX. In this image the fwk2 threads that … Read more
If you need to trace the HTTP request and response headers by capturing the related packets, you can use tcpdump in this way:
tcpdump -i ens192 -A -s 10240 'tcp port 80' | grep -v IP | egrep --line-buffered "..(GET |\.HTTP\/|POST |HEAD )|^[A-Za-z0-9-]+: " |sed -r 's/..(GET |HTTP\/|POST |HEAD )/\n\n\1/g'
For example, filtering tcp port 80 and 192.168.10.100 IP address:… Read more
Some time ago I was researching to find a good tool to create and manage IT documentation at work. These are the features that were essential for me:
- Editor Wysiwyg (not directly in markup language)
- Paste images directly (instead of first uploading it to insert it in the document).
- Team work: Full role and permission system. In case with LDAP
Probably you have noticed It’s a pain when you have to access the boot menu of a virtual machine by pressing <ESC> button while in the VMWare BIOS POST screen. It clears so fast you have to press the button multiple times, but still very complicated (if you press it after when the boot menu has been displayed, it … Read more
For the goal we want to achieve (hosting a web server, our personal files, personal streaming server, …) we do not even need the graphic … Read more
This is the 6th post of the “Home Server” series. In the last post we installed the ESX system in the SSD disk. The idea is to use 2 disks in Raid1 as data storage (RAID1 data mirroring. If one disk fails, you can still work with a single one until the failed is replaced without any data loss!).
Physical… Read more
Due to the vulnerability that allows privilege escalation I wrote about in this post, Microsoft has released a cumulative update for all supported versions of Exchange Server (Exchange 2010, 2013, 2016 and 2019).
- Exchange Server 2019 Cumulative Update 1 (KB4471391), VLSC Download
- Exchange Server 2016 Cumulative Update 12 (KB4471392), Download, UM Lang Packs
A new vulnerability that affects Exchange on-premise servers has been discovered recently (https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/). By making use of the high privileges Exchange servers have by default, the attacker would be able to escalate from any user with a mailbox to Domain Admin access.
According to Dirk-jan Mollema (see upper link), the vulnerability has been tested against …
- Exchange 2013