VPN Lumos
63 followers
- Report this post
WireGuard ProtocolWireGuard is an open-source communication protocol for setting up secure Virtual Private Networks (VPNs). Originally it was built in the Linux kernel in 2020 by researcher Jason Donenfeld and now is freely available for a wide range of operating systems.Advantages:✅ High-performance✅ Easy to set up✅ Security - the use of cryptographic key routing✅ Codebase - only 4000 lines of code✅ Accessibility - it’s not locked exclusively to any platformDisadvantages:❌ Development stage❌ Privacy concerns in terms of data packets❌ Used port❌ Stability issues due to the recent rollout
6
To view or add a comment, sign in
More Relevant Posts
-
Boomi -(Global Top Voice in Cloud , System Architecture)
Top “3%” in Global Cloud & Architecture Expert | Hands-on hybrid multi-cloud architect specialised in Migration, Modernization, CyberSecurity, Network, AIOps, DevOps, Platform Eng ;Author, Speaker, Mentor, Trainer,AWS CB
- Report this post
Have you heard about eBPF ?- eBPF (enhanced Berkeley Packet Filter) serves as a powerful and stable method for observing the Linux kernel. - Think of it as a virtual machine embedded within the kernel, running hooks (programs) to filter data such as network events, system calls, and packets. - With eBPF, we gain unparalleled insights into the inner workings of the kernel without compromising stability or introducing risks. 🚀💡 Usecases: - Enhancing Performance, - Observability, and - Security #network #security #data #linux #observability
15
Like CommentTo view or add a comment, sign in
-
Wayne Margolin
- Report this post
Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() callSonos Era 100 is a smart speaker released in 2023. A vulnerability exists in the U-Boot component of the firmware which would allow for persistent arbitrary code execution with Linux kernel privileges. This vulnerability could be exploited either by an attacker with physical access to the device, or by obtaining write access to the flash memory through a separate runtime vulnerability.Sonos state an update was released on 2023-11-15 which remediated the issue.
Like CommentTo view or add a comment, sign in
-
Kevin Dunn
Global Professional Services Leader & C-Suite Advisor
- Report this post
Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() callSonos Era 100 is a smart speaker released in 2023. A vulnerability exists in the U-Boot component of the firmware which would allow for persistent arbitrary code execution with Linux kernel privileges. This vulnerability could be exploited either by an attacker with physical access to the device, or by obtaining write access to the flash memory through a separate runtime vulnerability.Sonos state an update was released on 2023-11-15 which remediated the issue.
4
Like CommentTo view or add a comment, sign in
-
- Report this post
Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() callSonos Era 100 is a smart speaker released in 2023. A vulnerability exists in the U-Boot component of the firmware which would allow for persistent arbitrary code execution with Linux kernel privileges. This vulnerability could be exploited either by an attacker with physical access to the device, or by obtaining write access to the flash memory through a separate runtime vulnerability.Sonos state an update was released on 2023-11-15 which remediated the issue.
1
Like CommentTo view or add a comment, sign in
-
Chris Siores
Business Development Manager - Industrials
- Report this post
Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() callSonos Era 100 is a smart speaker released in 2023. A vulnerability exists in the U-Boot component of the firmware which would allow for persistent arbitrary code execution with Linux kernel privileges. This vulnerability could be exploited either by an attacker with physical access to the device, or by obtaining write access to the flash memory through a separate runtime vulnerability.Sonos state an update was released on 2023-11-15 which remediated the issue.
2
Like CommentTo view or add a comment, sign in
-
Bliss Orji
Passionate Technologist with Expertise in Software Development, Web Development, Cybersecurity, Web3, and Electronics Engineering - Proficient in Python, C, JavaScript and More. Software engineering @alx_africa
- Report this post
Network protocol analyzers, like tcpdump, are common tools that can be used to monitor network traffic patterns and investigate suspicious activity. tcpdump is a command-line network protocol analyzer that is compatible with Linux/Unix and macOS®. When you run a tcpdump command, the tool will output packet routing information, like the timestamp, source IP address and port number, and the destination IP address and port number. Unfortunately, attackers can also use network protocol analyzers to capture data packets that contain sensitive information, such as account usernames and passwords.
Like CommentTo view or add a comment, sign in
-
Greg Wallace
FreeBSD Foundation Partnerships & Research | MBA/MIA | Creator of ConscienceCart.com
- Report this post
NGL it's cool to see companies sharing that they run on FreeBSD to boost customer confidence in light of the xz backdoor impacting Linux. (Notice from FreeBSD Security Officer: https://lnkd.in/e6EeGGpf)But the big picture here is not which OS is more secure - that only leads to bikeshedding. No, a key takeaway is that any monoculture is a systemic risk. Diversity in digital infrastructure is a matter of security. I hope my friends in big tech grok this and invest accordingly.
43
4 Comments
Like CommentTo view or add a comment, sign in
-
ISSA - Columbus, GA Chapter
593 followers
- Report this post
Join us this Thursday as Casey Erdmann fills us in on the art of C2s!"This is a learning session for those new to the idea of how attackers leverage command execution to control hosts they compromise. It will cover the network protocols attackers commonly use, how those communications work, and some challenges that may arise when dealing with a vulnerable target. Participants will need a copy of Kali Linux with ngrok and Docker installed, or any host OS of their choice as long as they install Burp Suite, Docker, Wireshark, and ngrok."RSVP: https://lnkd.in/eKM9hqe5
6
Like CommentTo view or add a comment, sign in
-
Dimitris Chatzidimitris
Cyber Security Senior Penetration Tester
- Report this post
🔒New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection!🐞A new #vulnerability (CVE-2023-38408) has been uncovered in OpenSSH that can enable attackers to execute arbitrary commands remotely. It impacts all versions of OpenSSH before 9.3p2.🛡️Don't wait, update now and keep your systems secure.
5
1 Comment
Like CommentTo view or add a comment, sign in
-
Pich Ty
Full-stack Software Engineer | Information Security Practitioner | Founder of Capitise Management LLC
- Report this post
Understanding the fact that enumeration involves further privilege escalation is critical in understanding a hacker's mindset and knowing your disposable tools/syntax. Knowing the types of escalation for Linux such as: kernel exploits, Sudo, SUID, PATH, NFC, Cron Jobs, and getcap are empowering for beginner to intermediate hackers. We are only human; I suggest start working on a stash binder or online repository.
Like CommentTo view or add a comment, sign in
63 followers
View Profile
FollowExplore topics
- Sales
- Marketing
- Business Administration
- HR Management
- Content Management
- Engineering
- Soft Skills
- See All