Friday, June 22, 2018

Python Tips and Tricks

1. Install Python 2.7 / 3.0 on AWS EC2 Instance



[[email protected] pexpect-2.3]$ python --version
Python 2.7.14

Wednesday, June 20, 2018

CISCO ASA VPN Troubleshooting Tips

1. Clear VPN Configuration: 

clear configure crypto map VPN_AAAA


2. Debug and show commands:

Enable logging:

ciscoasa#terminal monitor
ciscoasa(config)# logging buffer-size 1048576
ciscoasa(config)# logging buffered 7
ciscoasa(config)# logging monitor 7
ciscoasa(config)# debug crypto condition peer 10.10.10.10
ciscoasaa(config)#
ciscoasa(config)# debug crypto ipsec 127


Monday, June 11, 2018

Basic Procedures to Troubleshoot an Infected Computer

Today received a report from user, computer is slow and seems have been infected with unknown virus or malware. No special symptoms except slow.

1. Check task manager and resource monitor

There is a process smss.exe which description is "Microsoft ? Console Based Script Host " using almost 75% CPU all the time.

From task manager, I found system was rebooted a couple of hours ago at very early morning and user was not around.

Also, no matter how you ended this process, it will come back in 10 seconds and take your CPU away and use about 4M your memory.



Tuesday, June 5, 2018

Gartner Magic Quadrant for Identity Governance and Administration (2018,2017,2016,2015,2013)

IGA (Identify Governance and Administration) is a central component of Identity and Access Management (IAM) designed to “manage digital identity and access rights across multiple systems and applications.”  Identity Governance and Administration solutions achieve this by aggregating and correlating identity and permissions data found throughout an enterprise’s digital ecosystem, and then utilizing that data to perform its core functions.

Gartner considers IGA’s core functions to include access requests, access certification, auditing, reporting and analytics, workflow management, entitlement management, and identity life cycle management.  Gartner evaluates IGA (Identity Governance and Administration) vendors based on the completeness of their vision and their ability to execute on their vision and roadmap.


2018
The vendors are in Leaders quadrant:

  • Oracle
  • IBM
  • SailPoint
  • One Identity
  • CA Technologies
  • Saviynt


Saturday, May 26, 2018

CISO Leadership Mind Map

SANS Cisco Mind Map
A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of.

CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO.  This Security Leadership poster made by SANS shows exactly the matters a CISO needs to mind when creating a world class IT Security team. It also highlights the essential features necessary of a Security Operations Centre (SOC).


Sunday, May 20, 2018

Canada CRA Phone Call Scam Fraud Recording 2018

Here is a recording for this notorious CRA phone scam happened on May 16 2018 while I was working in the office.

I received a couple of calls and managed to record whole conversation.

First "CRA" scam call for TAX dispute: 

Second "CRA" scam call for a lost suitcase under my name:


Wednesday, May 9, 2018

How to Find Out Windows Process Sending ICMP Packets

There are a number of different ways to find out which process is sending tcp / udp traffic in computer systems, but not much for icmp traffic.

Here is a summary for the ways to do it.

1. Install a local firewall

You could always try installing a firewall that blocks outgoing traffic or use the Windows Firewall. When the traffic is generated, it could prompt you asking whether you want to allow it or not. In many cases, it will tell you what application is generating the traffic.


Thursday, April 19, 2018

Gartner Magic Quadrant for Access Management (2017,2016,2015 )


Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an almost infinite number of identities and accounts on different platforms and devices including cloud, mobile, social, and personal networks. Having an identity and access management strategy in place is more important than ever.



2017 
Gartner recently named following vendors as  a leader in its first “Magic Quadrant for Access Management, Worldwide 2017.”

  • Microsoft
  • Okta
  • CA Technologies
  • Oracle
  • IBM
  • Ping Identity





NetSec Youtube Videos