Skip to content

volatile space Posts

Basic API logic app

I’ve been trying to find a good project to really leverage some API’s and even go a step further and implement some server-less functions. I really thought the best application for this would be at work, I mean where else am I going to find a project that needs this…

Comments closed

Pushing Emerging Threats to ASA

Nothing too crazy, but maybe useful to someone else. I’ve been getting more alerts regarding IP’s coming from the Emerging Threats list, found here. https://rules.emergingthreats.net/ There’s some resources there for automating block rules for some platforms like linux hosts, but nothing like an ASA. Choices for automating an ASA are…

Comments closed

Azure Express Route – Route injection attack vector.

    Express route is a great way to get some private routing into your Azure space. Larger organizations may implement the peering themselves with a Cloud Exchange provider like Equinix. Smaller organizations may utilize a middle man who handles the peering on behalf of them. A good example is…

Comments closed

Wet feet with netmiko

I still haven’t ran into much need for automating network tasks. In fact if I’m going to do much in that realm it’s probably going to be in Cloud platforms, not on iron in a rack. However, let’s say I wanted to block some inbound IPs to resources behind an…

Comments closed

DNS over TLS

This one has been a long time coming, I’ve been trying to get to this for over a month. It’s small on work but big on ideas. The Push for Encryption There incoming tide is pushing hard on everyone to encrypt all traffic on the web. I think it’s great…

Comments closed

Open source networking

My two favorite things in IT are networking and linux. It’s an exciting time for both right now because they’re kind of meshing together. Linux is fully recognized today as a powerful platform for business along with stable distro’s being available for workstation use. It really has come along way…

Comments closed

Lessons Learned

I recently found a pretty big issue with an appliance I work with. The manufacturer documentation stated that a local TFTP service to appliance was protected by DOS detection and mitigation. This should block any TFTP brute force attacks on the appliance. However, because of quite a few circumstances we…

Comments closed

New Year New Rack

I’m been very quiet lately but I’ve been pretty deep in networking. I decided that I needed to back-peddle a little and try for my CCNA. I feel like anything on that topic has been more than covered elsewhere and my work has been pretty well structured around the objectives,…

1 Comment