asteroza + ip   174

Configuring Kerberos for IP Address | Microsoft Docs
So SMB using IP's downgrades to NTLM, but if you set up W10/2016 with this, can use IP SPN's and kerberos to halt some of the pass-the-hash stuff. Unfortunately the IP SPN's don't autoupdate so you're boned in a DHCP environment...
security  kerberos  windows  10  2016  SMB  SPN  IP  address  NTLM 
june 2019 by asteroza
using custom TCP/IP stacks to assist bypassing UTM firewalls
custom  TCP  IP  stack  software  evasion  exfiltration  security  hacking  pentesting 
october 2018 by asteroza
LAteral Movement Encryption technique (a.k.a. The "LAME" technique)
I wonder why let's encrypt didn't isolate the internal IP range DNS entry SSL certificates to a child CA cert that enterprises could explicitly distrust, which would quash this in a heartbeat.
internal  IP  range  SSL  TLS  certificate  letsencrypt  lateral  movement  encryption  security  hacking  pentesting 
september 2018 by asteroza
AWS Developer Forums: Configurable Reverse DNS Records for Elastic IPs
Because many allegedly third party email blacklists are basically a shakedown...
AWS  EC2  TrendMicro  DUL  MAPS  SMTP  email  blacklist  exception  rDNS  reverse  DNS  elastic  IP  registration  antispam 
july 2018 by asteroza
Отслеживание количества актуальных IP адресов из выгрузки Роскомнадзора
SHowing number of IP's blocked by russian federal censors. Sudden jump to over 16 million IP's is due to spat with Telegram, which is domain fronting from google and AWS.
russia  IP  block  live  statistics  dashboard  censorship 
april 2018 by asteroza
Convenience rollup update for Windows 7 SP1 and Windows Server 2008 R2 SP1
Apparently a bug with this patch nukes VMware VMXNET3 adapters by replacing them with an identical network card but returned to default settings. Which means any static IP servers just went DHCP. Plus a VBscript to fix this seems lame... but this is the major rollup patch you should have so...
bug  fail  microsoft  windows  7  2008R2  VMware  NIC  network  card  static  IP  DHCP  VMXNET3  sysadmin  tips  tricks  networking  rollup  patch 
march 2018 by asteroza
Amaryllo, Your Security Robot Company
lightbulb socket based wifi home security video camera, new Atom R2 has LED in embedded lightbulb socket adapter so you don't lose the lighting
wifi  wireless  IP  video  camera  webcam  surveillance  Delicious 
june 2016 by asteroza
IP check
Uh, just connecting to this service is an OPSEC violation though...
privacy  security  IP  network  proxy  testing  checker  service  check  test  online  Delicious 
february 2016 by asteroza
AWS Fishing Panel
Reused elastic IP's with dangling DNS entires without short TTL's means I can potentially grab an IP for a major site, quickly deploy a phishing site emulating such site, and grab logins. Short TTL's and proper domain management will mitigate this though.
AWS  elastic  IP  dangling  domain  DNS  TTL  security  hacking  phishing  attack  Delicious 
october 2015 by asteroza
Rhino Security Labs | Ironclad Security for a Dangerous World
So this guy is going to make ProxyHam, an IP repeater box of sorts so you are not within line of sight of the AP you are stealing internet access from.
ProxyHam  wireless  IP  relay  hardware  electronics  devices  wifi  accesspoint  AP  security  privacy  bounce  repeater  Delicious 
july 2015 by asteroza
IPdeny IP country blocks
I don't advocate blocking a whole country, but if one has reason to, this is a reasonable start for collecting the requisite information (because blocking by DNS country code is dumb).
country  IP  address  block  listing  IPv6  security  reference  information  Delicious 
january 2015 by asteroza
Interesting, used by a 3D printer, but what are the merits compared to say something like CANnet or some other ethernet capable protocol?
Bowler  industrial  machinery  robot  robotic  control  protocol  design  concept  IP  software  Delicious 
may 2014 by asteroza
for Data Breach Management | Guardtime
Apparently KSI can somehow be leveraged to secure a streamed build file for a 3D printable object as it is streamed to a printer, to protect intellectual property in the build file from leaking.
KSI  security  keyless  digital  asset  tagging  management  signature  software  3D  printing  fabbing  build  file  DRM  IP  copyright  auditing  Delicious 
may 2014 by asteroza
iphone - ituneconnect using application loader behind a firewall - Stack Overflow 443 n/a 443* n/a 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 44001 44001-44500
upload  tricks  tips  sysadmin  networking  network  permission  firewall  range  port  IP  UDP  TCP  submission  app  iPad  iPhone  iOS  xcode  apple  Delicious 
november 2012 by asteroza
Looks like the ZigBee Alliance is punting using the 920MHz band for IEEE 802.15.4g compatible PHY/MAC layer services for ECHONETlite, the new japanese standard for electric appliance/equipment energy management and connectivity to HEMS applications.
ECHONET  ECHONETlite  ZigBee  802.15.4  802.15.4g  HEMS  home  energy  management  smart  appliance  electric  equipment  IP  layer  application  SmartHome  SmartMeter  SmartGrid  green  japan  Delicious 
august 2012 by asteroza
Block China Web Traffic IP Addresses and Chinese Hackers
While I feel using country specific netblock blocking is like using a bazooka to kill a fly, some people feel it does have its usefulness...
tricks  tips  sysadmin  security  nigeria  russia  china  country  netblock  address  list  block  IP  network  blacklist  Delicious 
april 2012 by asteroza
Chinese Bullet Trains Carry "Black Box" Controls - IEEE Spectrum
The fact that certain control equipment supplied by Hitachi was used, potentially blindly, in both the high speed trains that crashed as well as in the new nuclear reactors is a cause for concern...
system  control  blackbox  IP  protection  china  Hitachi  japan  Delicious 
october 2011 by asteroza
Rapid DHCP: Or, how do Macs get on the network so fast? : Caffeinated Bitstream
Interesting info about the differences between Apple and linux DHCP client operation when connecting to a network, which may be a known known network.
fast  DHCP  discovery  reconnect  IP  address  allocation  configuration  mac  OSX  linux  networking  network  performance  Delicious 
july 2011 by asteroza
Chatroulette Map
A site doing geoIP mapping of anonymous Chatroulette users, effectively deanonymizing the users.
NSFW  Chatroulette  webcam  IP  address  geoIP  geolocation  mapping  chart  map  googlemaps  information  data  visualization  heatmap  privacy  anonymous  deanonymizer  Delicious 
march 2010 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  3CX  3D  6LoWPAN  050  802.11  802.11b  802.15.4  802.15.4g  2008R2  academic  access  accesspoint  account  adapter  addon  address  adhearsion  advertising  advocacy  aggregation  AGI  AIM  AirWalk  ajavascipt  ajax  AJZaurus  algorithm  alias  alliance  allocation  alternative  amazon  AMI  analog  analysis  analytics  andorid  android  anonimization  anonymity  anonymous  antispam  AP  API  APi  app  apple  appliance  application  AR168F  AR168G  AR1688  architecture  Aredfox  art  article  AS  ASN  asset  asterisk  ATA  attack  audio  auditing  automatic  autorun  avatar  avator  AWS  b-mobile  backhaul  balancing  bandwidth  base  based  big  billing  billion  bit  bitstream  blackbox  blackhole  blacklist  block  blocker  blocking  blocklist  blog  bluetooth  BoM  bonjour  book  bounce  Bowler  broker  browser  BSD  bug  build  business  bvirtualization  bypass  C3  calculator  cam  camera  card  CARP  CD-ROM  CDMA  cellphone  cellular  censorship  centrality  certificate  chart  chat  Chatroulette  cheatsheet  check  checker  china  chipset  chrome  CIDR  Cisco  city  clearinghouse  client  cloud  CloudFlare  codec  coding  collaboration  collaborative  comments  communication  communications  community  computer  computing  concept  conference  conferencing  configuration  confirmation  consortium  consumer  control  copyright  core  cost  counterpath  country  CPE  credentials  CRM  crowdsourcing  cube  cube-of-doom  curl  custom  daemon  dangling  dashboard  data  database  deanonymizer  Debian  decision  defined  definition  delay  Delicious  demo  design  detection  detector  determination  development  device  devices  DFIR  DHCP  diagram  diagrams  DIAX  digital  discovery  dispute  DNS  documentation  domain  domaintools  doom  download  downloading  drawings  driver  DRM  Dropcam  DTN  DUL  dynamic  EC2  ECHONET  ECHONETlite  EdgePoint  edit  elastic  electric  electronics  email  embedded  EMEA  encryption  endpoint  enduser  energy  engine  enumeration  equipment  ESET  ethernet  EV-DO  evasion  evil  exception  exchange  exfiltration  experiment  experimental  extension  external  Eyebeam  fabbing  factor  fail  failover  fake  fast  femtocell  fiber  file  FireNet  firewall  firewire  firmware  flash  flow  foe  fork  form  Fotonation  FPGA  FQDN  framework  France  free  freeware  friend  FTP  function  g729  gateway  geobytes  geocoding  geography  GeoIP  geoIP  GeoLite  geolocation  Giraffe  GIS  gizmo  global  glyph  goldenfuture  google  googlemaps  GPL  graphics  green  grep  grepCIDR  group  growth  guide  H.263  h.264  h.323  hacking  hacks  handset  hardphone  hardware  HDL  header  headset  heatmap  helper  HEMS  high  Hitachi  home  hosted  hostname  hot  howto  HSRP  humor  hyperblocking  IAX  ICMP  icon  idea  ideagora  idefisk  identicons  identification  identify  IETF  IFF  igoogle  illustration  IM  image  images  import  IMS  index  industrial  industry  information  infrastructure  innovation  INS  instant  integration  intel  intelligence  interactive  intercept  intermediary  internal  internet  internet-of-things  interoperability  interplanetary  investment  iodine  iOS  IoT  ip  IP-PBX  IP2Location  iPad  iPAQ  iPhone  IPMP  IPPBX  IPR  IPSO  iptables  IPTraf  IPv4  IPv6  IPVisualizer  ISA1000  ISDN  itscom  Iwatsu  jabber  japan  japanese  Jitsi  JPEG  Kapanga  kerberos  kernel  keyless  knowledge  KSI  laboratory  LACP  LAG  LAN  lateral  law  layer  LBS  leak  leakage  letsencrypt  license  link  linux  list  listing  lite  live  load  lobbying  LOC  location  log  logging  lookup  low  mac  machinery  maltego  management  map  mapping  maps  market  marketing  marketplace  mashup  maxmind  memory  mesh  MeshCache  message  metadata  MIAU  microsoft  Mitel  mobile  moblock  module  monitoring  motion  movement  movie  MPEG  MPIO  MSN  MTP-IP  multicast  multipathing  name  NASA  national  NEC  netblock  NETDISCO  network  networking  Networks  Nexenta  NIC  nigeria  NineSigma  NSFW  NSTX  NTLM  NTT  O3B  object  objects  office365  offset  Ojo  ondemand  online  onsite  ooVoo  open  OpenFlow  OpenMoko  openPBX  OpenScape  opensource  OpenWengo  Opera  OPNFV  optic  organization  OSINT  OSX  other  outsourcing  over  overlay  p2p  PA1688  packet  patch  patent  pattern  Patton  PBX  pbxnsip  pc  peerguardian  pentesting  per-hop  performance  perl  permission  personal  phishing  phone  photo  physical  picture  pictures  Picviz  piercing  ping  Pingtel  PingTel  platform  plugin  politics  port  portable  position  PRECOT  presence  prevention  prgramming  printing  privacy  profile  programming  project  protection  protocol  provider  providor  proxy  ProxyHam  PTP  PTP-IP  punching  python  rails  range  RBL  rDNS  reader  realtime  recognition  recon  reconnect  recording  recovery  redundancy  reference  registration  relay  remote  removal  repeater  report  representations  reputation  research  resolver  resource  reverse  review  RFC3514  RFID  Ripcord  robot  robotic  robotics  roll  rollup  RoR  router  routing  royalty  ruby  russia  sales  Salesforce  satelite  satellite  scanner  scanning  scope  script  scripting  SDN  SEAL  search  security  segment  semantics  sender  server  service  setup  shared  sharing  Siems  signature  SIM  SIP  SIPexchange  SIPphone  SipxNano  skype  SLOT  small  smart  smartcard  SmartGrid  SmartHome  SmartMeter  SMB  SMTP  SNMP  Snom  socket  soft  softphone  software  SOHO  solution  space  spam  speech  speed  spinning  SPIT  SPN  SS7  SSL  stack  standard  standards  standby  startup  static  station  statistics  SteveChu  stitching  storage  streaming  STUN  submission  subnet  suddenbreakoutofcommonsense  Sun  Sunray  supervision  surveillance  switch  sync  sysadmi  sysadmin  system  tagging  tap  TCP  TCP/IP  technika  technology  telecom  telecommunications  telecommuting  teleconferencing  TelemoreEX  telephone  telephoney  telephony  telepresence  TELMAGE  template  terminal  test  tester  testing  text  thin  third  thread  threat  three  timezone  tips  TLS  tolerant  tools  trace  traceroute  tracking  traffic  transceiver  transfer  transform  transport  TrendMicro  tricks  Trixbox  trunk  trunking  TTL  TUN  tunnel  tunneling  turing  tutorial  ubiquitous  Ubuntu  UDP  Unibrain  unified  university  update  upload  uptime  URL  usage  USB  USB/IP  users  UTEK  utilities  VC  vendor  VIA  video  videocamer  videoconference  videoconferencing  videophone  videotelephone  videotelephoney  viewer  virtualization  vista  visual  visualization  Vitaero  VMware  VMXNET3  VNI  voice  voip  VPN  VRRP  vulnerability  WAF  warning  web  webAPI  webcam  webdev  WebEX  webRTC  Wengo  WengoPhone  WengoVisio  whatismyip  whiteboard  whitelist  whois  wholesale  wifi  wikipedia  wikipediavision  wimax  windows  wireless  world  worldwide  xcode  xcube  xlite  XMPP  Xorcom  XP  YIM  yopy  zaurus  ZigBee  Zigbee 

Copy this bookmark: