Assigning a CVE ID to Zero-Day Vulnerability
Whenever finding a new vulnerability in a software product, it's advisable that a researcher first notifies the company responsible for the product and gives them time to fix the identified vulnerabilities. I've found multiple vulnerabilities in Pfsense firewall and reported them to the Pfsense security team. They were ...
Automatically backup Pfsense configuration files
Introduction If you're using Pfsense as your firewall solution, then you've surely wondered about keeping your configuration files backed up. Normally, you have to go to Diagnostics - Backup/Restore to backup the configuration files manually as presented on the picture below. But we're all aware that manual ...
Apache JMeter: Part 1
Introduction Apache JMeter is a program that can test the performance of various servers. It natively supports the following protocols: HTTP(S) LDAP JMS SOAP JDBC (needs appropriate JDBC driver) SMTP(S) POP3(S) IMAP(S) Besides those, JMeter also has a lot of plug-ins that can be used to ...
Open Source Antivirus: ClamAV
1. Introduction We all know that checking downloaded files for virus signatures should be a mandatory thing to do nowadays because of all the malware existing in the world. ClamAV can be used to scan downloaded files, emails, pdf and rtf documents, etc. We can install ClamAV on all major ...
Honeypots
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are attracted to this system which appears to be poorly secured. The honeypots collect as much information as they can ...