Vulnerabilities

6K

Solutions

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Share tech news, updates, or what's on your mind.

Sign up to Post

Local server security.

I just got a ransomware attack. Hence I am asking for help to be able to achieve a great level of security for my server especially. and devices.

WHich devices should I get and why?
0
HTML5 and CSS3 Fundamentals
LVL 12
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

I'm looking for someone to help setup a new watchguard T15 and a BOVPN to an existing XTM25.  I know enough to be dangerous (maybe even that much).

I'd envision to have the person on the phone / remoted into my PC which would be on the LAN side of the T15 and I'd have team viewer connection to a PC on the LAN side of the XTM25 to set up the vpn (you are probably saying there's better ways to do the setup, but that's an indication of what I do and don't know).
0
does anyone know how viruses such as Hermes 2.1 infect machines on a local network ? if a user executes it on their machine does the virus then try and copy its self to other machines on the network or does it try and encrypt the drives remotely ?
0
Looking for Online /authorized Compliance Checker for my  vSphere Environment  5.x and 6.x - vCenter and Esxi Host
vSphere Hardening Guidelines for 5.x and 6.x - for my vCenter and Esxi Host
Any Tool from VMware we can use to scan and fix the vulnerabilities ?
1
Dear Experts, based on your experience, what are the important parameters that you will focus in defending DDoS attack when choosing Firewall model?
Many thanks!
0
Question from a Quallys report QID is 119518
0
I need to alert both Sysadmin’s and applications Admins by reports SEPARATELY by using Nessus Pro, how can I do scan for OSs exclusively, and applications exclusively?
And how do scan Windows exclusively? And Linux
0
http://www-01.ibm.com/support/docview.wss?uid=swg22005400

Security Bulletin: IBM MQ and IBM MQ Appliance MQOPEN call might succeed when it should have failed. (CVE-2017-1341 )


what does  IBM MQ and IBM MQ Appliance MQOPEN call means?
does it mean client side or server side?
0
0
Q1:
Was told by CyberArk  vendor that the Windows server/VM hosting Cyberark's Vault
should not be hardened ie leave it as vanilla: during installation, Cyberark will auto-
harden it?  Is this the recommended practice?

Q2:
Can share what are the hardenings that Cyberark do on the Vault (ie the Cyberark
DB) server?

Q3:
For the server running Cybark's PVWA & CPM, was told a few hardened off services
must be unhardened for PVWA/CPM to work: can share what are these?
0
Fundamentals of JavaScript
LVL 12
Fundamentals of JavaScript

Learn the fundamentals of the popular programming language JavaScript so that you can explore the realm of web development.

I need to do an Enterprise Architecture maturity assessment using TOGAF framework. Can anyone who has done something similar give me guidance on best way to approach this.
Over all approach
Red flag points
Action points

Thank you for your help.

J
0
I need to use Nexpose for scanning and we have a base license.  I sent a couple of emails to the company for assistance, but no response since last week.  Anyone familiar with this product that can assist?  I'm trying to scan our DMZ network for potential issues.

This will be an internal scan of the DMZ.
0
I have a user who is using the Watchguard VPN client software. They have been using it on Windows 10 Pro (v 1709) for 6 months without issue. The UAC prompt suddenly started appearing this morning when they try to run the software. No updates for Windows or the software have been installed. I have 60 other users that are using it without this problem also. I am at a loss as to why this would suddenly start needing elevated privileges to run. Does anyone know why this would happen or how to fix it? I am not going to disable user account control or give them admin rights.
0
Laptop was stolen from Starbucks.  Is there a way to track the whereabouts of the laptop?  It's not an apple machine.
0
I had this question after viewing Watchguard Firewall xFlow Configuration.
0
NESSUS vulnerability Scanner runs every often on my network. I see that All my Windows server 2008 R2, 2012 R2, Windows 8.1. shows the following two vulnerabilities below on the report as HIGH. We do have PCI regulation, we do not manage credit card services by the way.
1) TLS version 1.0 Protocol Detection
2) SSL Version 2 and 3 Protocol Dectection.
All my servers and Computers are patch monthly, so i do not think i am missing any patch. is there a way to fix this? I have a wildcar certificate from godaddy that i can use, so all my computers can talk using that? is this a good option?
Please advise.
Thanks,
0
have a client workstation that suddenly givea a '7-zip access denied' error on any executable but 7-zip is not installed(that i can find)  Malwarebytes scans clean and Vipre Internet Security scans clean.  Administrator/user permissions make no difference.
0
Good Afternoon,

We had a security audit of our entire network and were provided with a report of all potential vulnerabilities.
Working through these, we came across a list of users with the "allowed to be delegated to a service" vulnerability.

I've had a good search on google and ran the below powershell commands but I cannot seem to find anything regarding "These administrative accounts are allowed to be delegated to a service" on the users accounts and nothing is being returned from the powershell commands.

Get-ADUser -LdapFilter "(userAccountControl:1.2.840.113556.1.4.803:=524288)" | %{$_.DistinguishedName}

Open in new window

Get-aduser -ldapfilter "(&(userAccountControl:1.2.840.113556.1.4.803:=16777216)(msDS-AllowedToDelegateTo=*))" | %{$_.DistinguishedName}

Open in new window

Get-aduser -LdapFilter "(&(!(|(userAccountControl:1.2.840.113556.1.4.803:=524288)(userAccountControl:1.2.840.113556.1.4.803:=16777216)))(msDS-AllowedToDelegateTo=*))" | %{$_.DistinguishedName}

Open in new window

Get-aduser -LdapFilter "(&(userAccountControl:1.2.840.113556.1.4.803:=16777216)(!(msDS-AllowedToDelegateTo=*)))" | %{$_.DistinguishedName}

Open in new window


Does anyone know what "These administrative accounts are allowed to be delegated to a service" is?
Any why this is set when the accounts aren't even administrators?

Many thanks!
0
Customer has a watchguard T10 firebox firewall for a pos system.  The POS server connects directly to the trusted network port. no other computers connect to that network.  

Customer wants to setup an access point for wifi.  The watchguard has a 3rd port.  I want to activate it as a second network and allow wireless devices to access the internet.  

The watchguard firewall does not have built in wifi.  We purchased an access point that we plan to connect to the 3rd port.

This is a restaurant, there are no office pc's or network printers.

Need suggestions on policy's, the device has contenfilter subscriptions.  I want to enforce them on the 3rd port too if possible.
0
C++ 11 Fundamentals
LVL 12
C++ 11 Fundamentals

This course will introduce you to C++ 11 and teach you about syntax fundamentals.

I installed AIX 7.1 there is no application installed ,i upgraded java 5 to 7 .
When i run Nessus scan i am getting sslv2 and sslv3 detection vulnerability .
0
I installed AIX 7.1 there is no application installed ,i upgraded java 5 to 7 .
When i run Nessus scan i am getting sslv2 and sslv3 detection vulnerability .
0
How to block RFC 1918 and create object-groups and use that object-groups to block any udp traffic inbound to the external interface on a WatchGuard Firebox (M200)?
0
We have a Linux server and after it was scanned for any security vulnerabilities, we got one about "SSH Weak Algorithms Supported".  I tried to make a change to the ssh_config file under /etc/ssh/ to remove the support for any "arcfour" algorithm, but after another scan, it is still showing that this vulnerability exists.  Can anyone tell me exactly what I need to change?  This is my line in the ssh_config file:

 Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc

Thanks in advance!
- Christian
0
We have a Watchguard M200 firewall that we would like to limit inbound/outbound bandwidth to 20Mbps on our External (WAN) interface. Our ISP allows for 40Mbps total bandwidth. I've gone into Traffic Management and changed the interface to limit bandwidth to 20Mbps but this only seems to apply to upstream outbound traffic. Inbound traffic is still coming in at the fulll 40Mbps. Is it possible to also limit inbound traffic to 20Mbps?

Thank you
0
Hi, when i was trying to create  a new user account in bugzillla (from GUI) it says "A confirmation email has been sent containing a link to continue creating an account. The link will expire if an account is not created within 3 days". But i have not received any confirmation email. facing this issue from several days. i am able to receive mails earlier but encountering issue now. we are using smtp port 465.
0

Vulnerabilities

6K

Solutions

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.