Monthly Archives: April 2013

BlueCoat Policy Trace

Problem Description: Policy tracing is primarily used when debugging access to web sites. When something is allowed and it should be denied, or vice-versa, using the policy trace feature is the best way to diagnose the issue. Resolution: Enabling a

Tagged with: ,
Posted in BlueCoat

‘TOP’ Command

DESCRIPTION top provides an ongoing look at processor activity in real time. It displays a listing of the most CPU-intensive tasks on the system, and can provide an interactive interface for manipulating processes. It can sort the tasks by CPU

Tagged with: , , , , , , , , , ,
Posted in Useful Tools

Using ClusterXL with IGMP Snooping-enabled switches

Symptoms When using a ClusterXL cluster with an IGMP Snooping-enabled switch, the user experiences cluster instability, e.g., one member will be in ‘Down‘ state and the other will be in ‘Active Attention‘ state. The state of the members may also

Tagged with: , , , , ,
Posted in CheckPoint

Juniper NetScreen commands

Interface get counter statistics Show interface statistics (CRC errors etc) get interface trust port phy Show physical ports for a certain zone get driver phy Show all link states of interfaces get counter statistics interface ethernet3 Show hardware stats on

Tagged with: ,
Posted in Juniper

Checkpoint commands SPLAT

Check Point commands generally come under cp (general), fw (firewall), and fwm (management). CP, FW & FWM cphaprob stat List cluster status cphaprob -a if List status of interfaces cphaprob syncstat shows the sync status cphaprob list Shows a status in list form cphastart/stop Stops clustering

Tagged with: ,
Posted in CheckPoint

Checkpoint IPSO Nokia commands

IPSO commands newimage Installs IPSO OS from the local machine newpkg -m localhost Check Point package Install clish IPSO OS CLI ipsctl -a displays all of the IPSO Settings and Values ipsctl -a ifphys:eth-s5p1:errors|more display errors on eth-s5p1 ipsctl -w

Tagged with: ,
Posted in CheckPoint

Foot-printing + Recon Part 2

module 3a of ethical hacker series DNS Archive.org Takes snapshots of websites, crawls web pages and takes a snapshot, walk back to a snapshot of a website that may have posted sensitive information that may still be related in present

Tagged with: , , , , , , ,
Posted in Ethical Hacker

Recon and foot-printing Part 1 v04

module 3 of ethical hacker series Active / passive intelligence – Passive [indistinguishable from ordinary public traffic] – Google search [Patent applications, W hos the CEO? recent acquisitions all details you can find out about company you are wanting to pentest, general google searches and

Tagged with: , , , , ,
Posted in Ethical Hacker

VMware + Linux v03

module 02 of ethical hacker series. – Triangle 3 points of the triangle [Security at 1 point, Functionality, Ease of use. the concept is when you get closer to one you get further away from the other. for example moving strongly towards

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Ethical Hacker

Intro to Ethical Hacking v02

Module 1 – Recent hacks, SANS.org Power plants, big name entertainment companies, Twitter, Facebook, government agencies/departments, banks, music industries, defense systems companies etc… – Lulzsec, Anonymous Hacktivist groups, highly skilled groups of hackers – Cyber- Terrorism Country hacks, organised crime, payed hacks, corporate hacks, taking down life

Tagged with: , , , , ,
Posted in Ethical Hacker