Welcome.
Shall we play a game?
If you are looking for the original blog, it is still at https://blog.m0noc.com/
Recent Posts
- Multiple VPN tunnel selection using policy routingEver wanted to run multiple VPNs at the same time from the same device? Route a client down a different VPN at a boundary linux router? Introduction Linux has a wealth of networking capabilities, to the degree that it can operate as quite a powerful router, just without the hardware acceleration you get with a… Read more: Multiple VPN tunnel selection using policy routing
- Lets Encrypt Failure – It was DNS(ish) – a conspiracy of coincidencesOver the weekend I enabled DNSSec on this site and blogged about it [1]. Today Lets Encrypt renewed the certificate on the Origin Server via DNS-01 – its setup uses CNAMEs to allow internal devices to get public certs, described in an earlier blog post [2]. The certificate renewal failed. Considering it has worked since… Read more: Lets Encrypt Failure – It was DNS(ish) – a conspiracy of coincidences
- DNSSec All The Things – An Easy (and free) WayDNSSec is a technology that adds a layer of protection so that domain names and websites like this one are more resistant to being hijacked by a spoofed domain. In this case it provides an additional layer of authentication to allow a DNS resolver to prove that the answers it got are valid and not… Read more: DNSSec All The Things – An Easy (and free) Way
- Three Random Words – An adventure in passphrase crackingDuring a recent red team engagement, we came across several useful artefacts after compromising an IT helpdesk user account. One of particular interest contained a list of useful sites, including a well-known password generator site. This is one of a class of sites that generate a password by selecting a number, say 4, random words… Read more: Three Random Words – An adventure in passphrase cracking
- Vulnerabilities in EasyInstall asset managementSeveral months ago, whilst on a client engagement, I identified a number of zerodays in an enterprise asset management application called EasyInstall. This gave me, among other things, elevation of privilege on managed assets, a wealth of information for recon, and – most interestingly – unauthenticated remote secure wipe of any asset. The blog on… Read more: Vulnerabilities in EasyInstall asset management