Operators must stop installing Huawei 5G kit from next September

The UK government has announced that UK mobile operators must stop installing new Huawei 5G equipment after September next year, following its decision to impose stricter restrictions on “high risk” vendors.  In July, the Government announced that – despite previously permitting Huawei a limited role providing equipment for the non-core parts of the UK’s 5G network – … Read more

NCSC forced to ramp up response to escalating cyber attacks during pandemic

The National Cyber Security Centre (NCSC) has defended the UK from more than 700 cyber attacks in the last year alone, according to figures given in its annual review. The UK has been beset by cyber attacks since the outbreak of Covid-19 in March and the NCSC has been focusing its resources on the pandemic response. The … Read more

Evading Firewalls

IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as a trusted host. Using spoofing to modify address information, the attacker can make the source of an attack appear to come from someplace else rather than the malicious party. Source Routing Using this technique, the … Read more

What’s That Firewall Running?

To determine a type of firewall and even a brand, you can use your experience with port scanning and tools to build information about the firewall your target is running. By identifying certain ports, you can link the results to a specific firewall and from that point determine the type of attack or process to … Read more

Firewall Configurations

Not all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we’ll cover each method. Bastion Host A bastion host is intended to be … Read more

Firewalls

Firewalls are another protective device for networks that stand in the way of a penetration tester or attacker. Firewalls represent a barrier or logical delineation between two zones or areas of trust. In its simplest form an implementation of a firewall represents the barrier between a private and a public network. When discussing firewalls, it … Read more

IDS Detection Methods

Signature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse detection. The system compares traffic to known models and when matches are found it reports the attack. Pattern matching is the most basic form of detecting and is used in many systems. The process relies … Read more