Ads 468x60px

30 December 2019

Happy New Year

This year is nearly ended. I’m hear. Writing in my room. Thinking about what I’ve been doing this year. I’m sure I’ve done many things. Lots of them are written in this blog. Some of them will keep in my head. Many other things will be forgotten. This year has been thrilling but with ups and downs. I have to keep only the good things and throw away the bad ones. I think this is the best way to go ahead. I’m lucky. I’ve been working in many projects. I’ve met up many IT professionals. I’ve learnt a lot this year.

At the beginning of the year, I was the teacher of a ethical hacking course and another one about forensics in Merida where students learnt many hacking and forensics techniques such as fileless malware forensics. I also installed and configured two pairs of Mellanox Ethernet Switches in a datacenter with 100 Gbps links. Thanks to this project and these datacenter switches I learnt about RDMA over Converged Ethernet (RoCE). In addition, I was studying about Cisco Data Center technology such as Cisco Nexus vPC or Cisco Nexus FabricPath.

Before summer, I was studying a lot about French Language and I passed the exams at Official School of Languages. Today, I keep learning French and I would like to pass the B1 level in 2020. I worked in new projects. Mainly, projects about firewalls and load balancers. I didn’t know anything about the ISA-95 levels for Industrial Systems till I worked for a big industrial company. Any step and any change should be documented and notified with a change procedure. Amazing!

Summer was for reading and learning new tech things. I read Inside Soviet Military Intelligence, No Logo and the National CyberSecurity Strategy of Spain. In addition, I installed the RedHunt OS for Adversary Emulation and Intelligence which is useful for testing Red Teams and Blue Teams. I was working almost the whole summer. I was only on holiday for a few days because I had to finish two projects. One project about FortiWeb and another one about F5 BIG-IP vCMP. Both really interesting.

The end of the year has been thrilling and rewarding. We have moved Ariolo Cloud Services from one datacenter to another one which has better facilities. Therefore, the same BGP AS Number in two datacenters has been mandatory. I’ve worked a lot with F5 BIG-IP. You can watch all the videos I’ve uploaded to my YouTube channel. I’ve configured OAuth with Facebook, SAML with AWS and SAML with Salesforce. OAuth and SAML are two protocols I didn’t know, but once I know, I've realised they are really interesting as Multi-Factor Auth for Cloud Applications.

To sum up, this has been a year with lots of projects. I’ve mainly been working in security and networking projects but I’ve also been working with virtualization, storage, systems and cloud computing. Actually, I haven’t had time to get bored.

Merry Christmas and Happy New Year.

23 December 2019

F5 BIG-IP APM - AutoLaunch SAML Resources

I think Webtop and Web Access are great to have a Single Sing-On (SSO) Portal. In fact, we can configure a SSO Portal like Google does with applications such as Gmail, Drive, Calendar, etc. Therefore, we can access with a single password in a single web portal to all applications. 
We have already known how to configure cloud connectors, such as an AWS Connector and a Salesforce Connector, with SAML in a Web Access. Accordingly, there is a web portal with Webtops which launch SAML resources for SSO access to AWS and Salesforce. However, if we want automatically launch SAML resources and skip the Webtop, we’ll have to make some changes into the configuration.

Visual Policy Editor
Firstly, we no longer need Web Access neither Webtops. Thus, we can uncheck these configurations. Secondly, we have to add an iRule to the virtual server hosting the access policy. Finally, we can enjoy the better user's experience.

Best regards my friends. Keep learning!

16 December 2019

F5 BIG-IP APM - Setup a Salesforce Connector

I’m working a lot with F5 BIG-IP APM lately. Actually, I’ve been configuring F5 BIG-IP APM – SAML. For example, you can watch in the last post how to configure an AWS Connector in F5 BIG-IP APM. Today, I’ve published a new video where you can watch how to configure a Salesforce Connector in F5 BIG-IP APM. These two videos are really similar but they have helped me to understand how SAML works and how to configure SAML in F5 appliances. 

Best regards my friends. Keep learning!

9 December 2019

F5 BIG-IP APM - Setup an AWS Connector

I’ve already written about F5 BIG-IP APM – SAML but I also wanted to know how SAML works in F5 APM. I wanted to know how to configure SAML in F5 APM. Therefore, I’ve been testing with the AWS Connector for SAML these days. We can watch in the next video how to configure F5 APM as a IdP (Identity Provider) Service and AWS as a SP (Service Provider). At the end of the video, we’ll watch how users, which are in the F5 database, can access to the AWS console.

Best regards my friends. Keep learning!

2 December 2019

Five OSSTMM Security Areas

I heard about OSSTMM five or six years ago at Ariadnex for the first time. I didn’t learn anything about hacking at University. However, I wanted to learn more and more about security. Therefore, I studied for the CISA and CISM certifications. I got it! Today, I’m working as a teacher for IT Security courses. In addition, I work as an auditor on information security. When I work as an auditor, the ISO/IEC 27001 is the best standard for auditing policies, procedures and controls but if I have to test the company, OSSTMM is the best methodology.

OSSTMM has mainly five security areas. Human Security Testing is the first one. Employees are not used to working with a security mindset. They are working in their tasks. Most of the time, they don’t want to know anything about security. Therefore, a social engineering attack give you whatever. A social engineering attack is useful to get sensitive information. This first security area takes into account the personnel security awareness. However, I think social engineering attacks aren’t easy because we have to cheat people.

The second security area is Physical Security Testing. Have you ever steal something? Have you ever gone in a house where nobody told you to go in? This security area assesses access controls, security processes and physical locations. It’s amazing how the OSSTMM tell you equipment is important. “Equipment can range from rope to climb walls to SCUBA gear to travel under water”. I think physical security testing is also very difficult for most people because we’ll have to hide and not make noise for “stealing” sensitive information.

The Wireless Security Testing is the third security area. We are going to test the spectrum security (SPECSEC) thus we’ll have to be near locations. The objectives of this security area are physical and logical barrier testing. In addition, the spectrum security includes electronics security (ELSEC), signals security (SIGSEC) and emanations security (EMSEC). It’s also interesting how OSSTMM tell us we “need to be prepared for the possibility of accidental bodily harm from exposure to electromagnetic and microwave radiation”.

The fourth security area is Telecommunications Security Testing. This security area is within the electronics security (ELSEC) realm where we are going to analyse telecommunications over wires. What are the attack vectors we are going to test? PBX testing, voice mailbox testing, Voice over IP testing (VoIP), etc. We’ll have to know about digital and analog telecommunications.

Finally, the last and fifth security area is Data Networks Security Testing. This is my favourite one because we can attack computer systems and network systems. However, we have to do it with stealthy. We have to avoid disclosure of the tests by operators. It’s easier than the previous security areas and we don’t have to be near the target. Some engineers consider this area as “penetration testing”. Networking knowledge and security testing skills are required in this area for Analysts.

Best regards my friends. Keep reading and keep learning my friends!
Related Posts Plugin for WordPress, Blogger...

Entradas populares