June 22, 2018

Recent Posts

Tenable Nessus, where has my API gone?

Nessus Professional (Pro) is undoubtably one of the cyber security consultants favourite tools. It has also been a widely adopted tool for organisations on a budget  looking to start out in the never ending world of vulnerability management. It’s humble beginning starting out as a fully open source tool, to the favourably priced commercial  entity we see […]

KT Labs EP5 :: ACS to ISE Migration

In the video, I show you how you can leverage the ACS to ISE migration tool to migrate objects from ACS to ISE. As mentioned in the video, a few prerequisites need to be met, these are listed below. Prerequisites Direct connectivity to both the ACS and ISE platforms The correct version of ACS (see […]

Cisco ISE :: Adding Traditional Licenses

In this video, I demonstrate how to add traditional licenses to Cisco ISE. Note: This lab video uses Cisco ISE 2.3

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]

DNS Sinkhole – What is it & Why do I need one?

In this post I will talk about DNS Sinkholing, what it is and how it can help you identify potentially infected machines. Useful in the fight against malware such as viruses, Ransomware and Crypto Jacking! What is DNS? Domain Name System – in very basic terms, the internet (and local networks) are all routed by […]

FortiGate :: HA Routed Failover w/ Session Failover

A recent requirement that came up was for there to be a redundant pair of firewalls, which allowed for session failover, configuration synchronisation and also maintain different external IPs and seperate BGP peering. A niche request, but something that was supported with FortiGates. Below details some configuration examples to achieve this. Config and Session Sync […]

Cisco :: Upgrade or Reimage Firepower 8300 Sensors?

Recently I was tasked with upgrading some new Firepower 3D8350 sensors which would later be stacked into a 3D8360. These devices were shipped with software version 5.4.0.1 and I had a customer requirement to upgrade the sensors to version 6.2. I would normally stack these devices and upgrade them using the FMC, however, I didn’t […]

KT Labs EP4 :: Automation using Ansible for Network Engineers

In this Vlog, I discuss how Ansible can be leveraged by engineers to automate configurations and save time. Ansible files for download: https://blog.synack.co.uk/download/kt-labs-ep4-ansible-files/ More about setting up Ansible: https://wp.me/p8lfsH-mn Ansible Documentation: http://docs.ansible.com/   Getting started with automation using ansible from Kelvin Charles    

Cisco :: Add Licenses to Cisco IOS Switches

In this video, I run through the configurations required to add and activate licenses on your Cisco IOS switch. A Cisco Catalyst 3750-x switch with IOS 15.x is used for this demonstration along with a SolarWinds TFTP server.  
Page 1 of 1112345 » 10...Last »

Subscribe to SYNACK via Email