Detecting Macro Enabled Office File In an Attachment
Detecting Macro Enabled Office File
Nowadays, the attackers pushes massive spam campaigns in order to spread their malwares. They use macro enabled spear-phishing office documents as an e-mail attachments. Generally, they are using...
BlackNurse Denial of Service Attack
BlackNurse Denial of Service Attack
"Remember the days back in the 90s when you could cripple someones Internet connection simply by issuing a few PING command like “ping -t ”? This type...
Unknown Unicast Floods As a Local DOS
Unknown Unicast Floods As a Local DOS
In the last three months, I faced with a problem on my Layer 2 topology. The problem behaved like a broadcast attack and about 10Gbps backup traffic was...
BGP-Targeted DoS Attacks
BGP-Targeted DoS Attack Can Disrupt Internet Routing
Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway Protocol's concepts and...
Snmp Amplification DDOS Attack
Approaching Danger; Snmp Amplification DDOS Attacks
SNMP (Simple Network Management Protocol) is the protocol which is used for monitoring the instant traffic data, gathering information and changing the configuration of the devices,...
Dns Amplification DDOS Attacks
Dns Amplification Attacks and How Much Vulnerable We are as A Country
Last week, I talked about one of the misuse type of DNS protocol is DNS tunneling. Today, I am going to...
Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS
Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS
Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway...
Detecting and Blocking DNS Tunneling
Detecting and Blocking DNS Tunneling
DNS (Domain Name System) is the protocol which is composed of hierarchical and dynamic database and it provides us IP addresses, text records, mail exchange information (MX records), name...
Multiple Security issues with ScreenOS (CVE-2015-7755, CVE-2015-7756)
On December 17th, 2015, Juniper Networks published an Important Announcement about ScreenOS which is pointing authentication backdoor and VPN decrypt on GT and SSG series devices.
The backdoor can be exploited by using...