Friday 31 July 2015

I've seen the dark


I've seen the dark
I experienced a fall
Everything was black
Surrounded by walls

I've been Down
I've seen below
No smile, only frown
No where to go

It is Time to rise
Be strong again
Surface and go above
And set free from the pain

See the sunshine
Feel the sun on my skin
See the blue skies
and the beauty around me

I've seen the dark
Dark I've never seen before
I don't want to be in the dark
Not anymore


By Renato de Oliveira.

Recovering the Root Password for SRX Series Devices

Last week I also had to break a password and did not remember how. So I had to research into it.
1. Reboot or power off and back on the juniper SRX
2. When the boot operation finishes, just press <SPACE> bar few times to have access to the boostrap loader prompt.
loader>boot -s

3. loader> System watchdog timer disabled
4. Set the new root password
                user@host>edit
     user@host# set system root-authentication plain-text-password
     user@host# commit

How to Factory Resta Juniper Firewall SRX

There are a couple of ways of factoring reset a Juniper firewall.


a) Having physical access to the firewall itself and you will find a button at front of the firewall.

All you need to do is find a paper clip and press the paper clip through the small hole and hold it for about 30 seconds.

b) If you have access to the the command line and can go to edit mode, do as follows:


  •                  root@firewall> edit
  •          root@firewall# load factory-default


Set root password:

root@firewall# set system root-authentication plain-text-password

root@firewall# commit

I am writing about this, because I had a firewall I started setting up few months ago and I had to reset it factory.


Sunday 12 July 2015

Security: Some ideas on how to protect your network and systems

The goal post is always moving, the threats are always changing, but there are loads of things we can do to make it harder.

I am going direct to the point and make it short.

Some ideas on what to monitor

  • Active directory object creation
    • User creation, and change
    • Group creation and change
    • PC account creation and change
If you have not added, created, changed accounts chances are someone did it. If it was not created by IT, changes are, it was an attacker. If you are monitoring closely your AD, then you have a good chance of catching it before the accounts can be used to do any real damage.
  • Data deletion and data growth
I think this one is pretty obvious, if a large chunk of data has just vanished, something is seriously wrong, right? If I see a volume let's say which had 1TB and all of a sudden, it gone down to 500GB, I would jump on it right away and start asking questions to all users, have you deleted this data, if no one raises their hand up, something somewhere needs to be investigated. There is a good chance you've been attacked. So monitor data deletion.
  • Monitor Interface Band Width
Ones needs to have a base line, knowing what is normal in terms of traffic can help you in identifying if you are under attack or not. If you don't know how much traffic your routers, firewalls, and servers pass through daily, weekly, monthly how you would know if it is a normal condition or not? 
  • Monitor email Queue 
The same principal applies. Knowing how many emails, hourly, daily, weekly and monthly will help you in the fight. Know what is normal condition for your system.
  • Monitor web server hits
  • Monitor user creation, deletion and modification for Linux servers
  • Monitor file changes, especially config files servers and devices
  • Scan and monitor for new hosts and devices
If you see a host you don't know or recognize, investigate it. Check its MAC address, its IP address, check who has such device. Never leave an unknown device without tracking it down!
  • Monitor your Internet access
  • Monitor Successful and unsuccessful login attempts 

It is important to have a monitoring in place, but it is also very important to watch closely this system. And follow up in any alerts generated by the systems.

These are just some of the things you can monitor to help you in the fight against attackers, there are many more and it is one of your tasks to study your system really well and analyse the entry points, and put monitoring in place.

Hope this is useful to you and if you have some other ideas, please share with us and we would very much appreciate it.

Renato


Onde estao aquelas emocoes?

Onde estao aquelas emocoes
queria deixa-las a vista
onde eu pudesse ve-las
Elas que sempre se vao
quando eu mais preciso delas
quando me sinto vulneravel
quando estou mais exposto
Cade aquela alegria?
Onde esta aquela calma?
Por onde anda a tranquilidade
Que tanto precisa minha alma?
Pra onde foi a paz
que acalenta meu espirito
que me faz ter esperanca
que me faz ver tudo mais bonito
o ar ta cheio de conflitos
minha visao nublada
minha cabeca pesada
entregue a preocupacao
caminhando sozinho
emocoes turvas
sao estas mais fortes?
As que me pegam de supetao
Ou sou eu mais sensivel
a tal tipo (negativo) de emocao?
Parecem durar muito
e nunca quere ir embora
parecem querer habitar o meu mundo
sempre voltando de ultima hora
Onde estao as emocoes
Boas, que fazem sonhar
Que fazem acordar de manha
e com vontade respirar
As emocoes de quando se ve o sol
e sente aquecer a pele
quando se ve o ceu azul
um suspiro, e tudo fica leve
Onde estao essas emocoes
Que relaxam o corpo
que desnevoa a mente
Que deixa o corpo relaxado
e que apruma o passo
pra se caminhar em frente
SAo essas, emocoes?
Sera que elas existem?
Sera qua neo sao so ilusoes?
Onde estao essas emoces?

Por Renato de Oliveira