Firewalls: What They Are & Why You Need Them

There are some phrases that you hear bandied about, and you think that you know what they are. You have a basic understanding and that suits your current needs. Firewall is one of these words. You will be familiar with it already, but do you really know what one is? In its simplest terms, a […]

DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete control of the targeting network systems. IoT based cyber Attacks are blooming since the number IoT devices are increasing rapidly and attackers always find the many ways to bypass it. In this case, Doubledoor Botnet […]

New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor

A new Internet of Things (IoT) botnet campaign dubbed as DoubleDoor has been discovered by NewSky Security, which uses two exploits for bypassing authentication procedures on victim devices and also nullify additional security features. In this campaign, attackers can easily take full control of the targeted devices despite the user has enabled authentication or added […]

CFC – Linux Centralized Firewall Control

Centralized firewall control provides a centralized way to manage the firewall on multiple servers or loadbalancers running iptables. This way you can quickly allow/block/del/search abuse ranges etc. with one command on several servers. It accesses those servers through ssh. It supports both IPv4 and IPv6. Tested on Debian 6.x / 7.x / 8.x / 9.x, […]

CISCO ISSUES NEW PATCHES FOR CRITICAL FIREWALL SOFTWARE VULNERABILITY

Cisco has released new patches for a critical vulnerability in its Adaptive Security Appliance software after further investigation revealed additional attack vectors. The company first announced the vulnerability, CVE-2018-0101, on Jan. 29. It received a Common Vulnerability Scoring System base score of 10.0, the highest possible, and was initially discovered by Cedric Halbronn from NCC Group. “After broadening […]

dotDefender – Web Application Firewall

dotDefender is a web application security solution (a Web Application Firewall, or WAF) that offers strong, proactive security for your websites and web applications. It can handle .NET Security issues. It helps you achieve Compliance with the Payment Card Industry Data Security Standard (PCI DSS Compliance). dotDefender uses a number of engines to detect and prevent hacking […]

Assimilator: Automatic Firewall Rule Orchestator

The first restful API to control all firewall brands. Configure any firewall with restful API calls, no more manual rule configuration. Centralize all your firewalls into one API. Multiplatform Palo Alto Juniper Cisco Fortinet Checkpoint PfSense AWS Authentication API key through HTTP headers. Flexible authorization, allow certain URI path with certain HTTP methods. JSON All […]

How to use Hacking Tools Without Opening Ports on Router NAT Firewall

Hello, welcome back in a recent tutorial (How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux) we worked with Ngrok creating secure introspectable tunnels. Using tunnels while pentesting can be a lot safer using these encrypted tunnels we can expose a local server behind a NAT or firewall to the Internet essentially bypassing restrictions […]

A Malware That can Bypass Windows Firewall Using Intel’s Management Tech

A unique and perhaps a very practical way of injecting malware into an entire network has been discovered in which the hacking group uses Intel’s Active Management Technology (AMT) to bypass Windows’ built-in firewall and as such go undetected. The Active Management Technology (AMT) Active Management Technology (AMT) is a technology that allows remote access […]

WAFNinja – Tool to attack Web Application Firewalls

WAFNinja is a tool which contains two functions to attack Web Application Firewalls. WAFNinja – Penetration testers favorite for WAF Bypassing WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be […]

Smith – A Very Quick And Dirty Server Tool For Testing Firewalls

A client/server style agent meant for testing connectivity to and from a machine on a network. Installation python setup.py install or pip install . should install smith. Note: If you want to use the tcp/udp protocol options, you’ll need to install scapy and it’s dependencies. Ubuntu has ‘apt-get install python-scapy’. You can also pip install […]

Juniper SRX firewalls open a root-level account due to a flaw

Experts at Juniper have discovered that an update for its Juniper SRX firewalls opens a root-level account on the network device. The company started warning its users, every user who issued the “request system software” command with the “partition” option is affected by the issue. The failure of the system update leaves it in a state where root CLI […]

Raptor WAF – Web Application Firewall Using DFA

Raptor WAF is a simple web application firewall made in C, using KISS principle, to make poll use select() function, is not better than epoll() or kqueue() from *BSD but is portable, the core of match engine using DFA to detect XSS, SQLi and path traversal. Short video: WAF stands for Web Application Firewall. It […]

What is Windows Firewall and How to Use it

Windows Firewall, previously known as Internet Connection Firewall or ICF, is a protective boundary that monitors and restricts information that travels between your computer and a network or the Internet. This provides a line of defense against someone who might try to access your computer from outside the Windows Firewall without your permission. If you’re […]

Are You Ready for Firewall Protection for Your Car?

The Internet-connected cars will require firewall protection and some companies are already providing it The Internet has invaded most of the things in our world and its scope is broadening day by day. This time, it is our vehicles that will be receiving a digital boost. The reason is that cars are already being connected […]