SSH-Audit is a tool for SSH server auditing.
- SSH1 and SSH2 protocol server support;
- Grab banner, recognize device or software and operating system, detect compression;
- Gather key-exchange, host-key, encryption and message authentication code algorithms;
- Output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
- Output algorithm recommendations (append or remove based on recognized software version);
- Output security information (related issues, assigned CVE list, etc);
analyze SSH version compatibility based on algorithm information;
- Historical information from OpenSSH, Dropbear SSH and libssh;
no dependencies, compatible with Python 2.6+, Python 3.x and PyPy;
Source: SSH Server Auditing
Boxstarter is an application that makes it easy to create a repeatable, reboot resilient windows environment installation using Chocolatey packages. When its time to repave either bare metal or virtualized instances, locally or on a remote machine, Boxstarter can automate both trivial and highly complex installations.
Download and More Information: Boxstarter
- Windows 10 ISO or Windows 10 DVD
- A USB drive with 4GB+ size
- Working Windows 7/8/8.1 PC to create the bootable USB
Follow the instructions at Install Windows 10 From USB Drive for the remaining steps.
You can implement traffic policy rules for logout behaviour using the Traffic Management functionality on NetScaler 10.0 releases. The Traffic Management logout functionality will trigger the AAA session logout.
Another shortcut is to visit your <Citrix URL>/cgi/tmlogout page to force the logout.
Source: Traffic Management Logout Functionality on NetScaler
I recently had to complete some work with inspecting a PDF file for malicious content. This was an interesting experience so I thought I’d share the approach I took to review the file from a sandboxed environment:
1. Start with using a service such as virustotal.com, scanii.com, metadefender.com to scan the file
2. Use Adobe Acrobat to browse the internal PDF structure. Launch the PreFlight Tool (Print Production > Preflight) and then under Options select Browse Internal PDF Structure.
3. Use an Adobe PDF meta data application to inspect the file. Here are some I used that were quite helpful:
peepdf.py – PeePDF is a Python based tool to explore PDF files
pdf-parser.py – PDF-Parser is a Python based tool to parse a PDF document and identify the fundamental elements used in the file.
- Checking a PDF for exploits
- Viewing PDF objects
- PDF Tools from Didier Stevens
- Best tool tool for inspecting PDF files?
- PDF malware analysis
- PDF Validator Online Tool