Home Network Security

Network Security

From Evasive Malware to Hacker’s Passwords and Identity

0
Last week, while I am analyzing one of the sample that I found it very suspicious, I found SMTP,FTP and C&C passwords of the malware writer and some interesting...

Detecting and Blocking DNS Tunneling

1
Detecting and Blocking DNS Tunneling DNS (Domain Name System) is the protocol which is composed of hierarchical and dynamic database and it provides us IP addresses, text records, mail exchange information (MX records), name...

BlackNurse Denial of Service Attack

1
BlackNurse Denial of Service Attack "Remember the days back in the 90s when you could cripple someones Internet connection simply by issuing a few PING command like “ping -t ”? This type...

BGP-Targeted DoS Attacks

3
BGP-Targeted DoS Attack Can Disrupt Internet Routing Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway Protocol's concepts and...

Detecting Macro Enabled Office File In an Attachment

0
Detecting Macro Enabled Office File Nowadays, the attackers pushes massive spam campaigns in order to spread their malwares. They use macro enabled spear-phishing office documents as an e-mail attachments. Generally, they are using...

Unknown Unicast Floods As a Local DOS

0
Unknown Unicast Floods As a Local DOS In the last three months, I faced with a problem on my Layer 2 topology.  The problem behaved like a broadcast attack and about 10Gbps backup traffic was...

Savunma Sanayii Firmaları ve Finansal Kuruluşları Hedef Alan Zararlı İncelemesi

0
GIB şablonu kullanılarak savunma sanayii firmaları ve finansal kuruluşları hedef alan, zararlı içerik barındıran e-postalar gönderilmektedir. Göndericinin "posta*@gelirler.gov.tr" olması, mail içeriğinin inandırıcılık açısından oldukça başarılı olması, düzgün bir Türkçe ile hazırlanması ve...

Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS

0
Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway...

Multiple Security issues with ScreenOS (CVE-2015-7755, CVE-2015-7756)

1
On December 17th, 2015, Juniper Networks published an Important Announcement about ScreenOS which is pointing authentication backdoor and VPN decrypt on GT and SSG series devices. The backdoor can be exploited by using...