How To: CentOS 7 Router

image_pdfimage_print

I have had to create a few CentOS 7 minimal router systems over the past few weeks for my research environments and decided to document the process. CentOS 7 makes use of systemd and firewalld which is a change from previous versions which were openrc and iptables based. The process of creating a minimal router system is fairly straight forward and can be completed in a very short amount of time after the initial installation with minimal dependencies.

Continue reading ‘How To: CentOS 7 Router’

DefCon 23 Presentation: Exploring Layer 2 Network Security in Virtualized Environments

image_pdfimage_print

DefCon 23 Video Demo: Rogue DHCP/DNS server gaining root access to target

image_pdfimage_print

DefCon 23 Video Demo: Rogue DHCP/DNS server ShellShock exploit proof of concept

image_pdfimage_print

DefCon 23 Video Demo: Rogue DHCP/DNS server on Citrix XenServer 6.2 with Open vSwitch 1.4.6

image_pdfimage_print

DefCon 23 Video Demo: MAC Flooding on Citrix XenServer 6.2 with Open vSwitch 1.4.6

image_pdfimage_print

DefCon 23 Video Demo: MAC Flooding on Gentoo/Xen with Open vSwitch 2.0.0

image_pdfimage_print

DefCon 23 Video Demo: MAC Flooding on Gentoo/Xen with 802.1d Bridging

image_pdfimage_print

Disabling User List in GDM (Gnome 3)

image_pdfimage_print

In a multi-user environment you really do not want a full list of usernames being displayed in the GDM login screen for security reasons. In order to disable this feature on my Gentoo lab systems running Gnome 3 and GDM I performed the following actions.

Continue reading ‘Disabling User List in GDM (Gnome 3)’

Exploring Layer 2 Network Security In Virtualized Environments – DerbyCon 4.0

image_pdfimage_print

I gave a talk this past weekend on part of my Ph.D. dissertation research at the DerbyCon 4.0 “Family Rootz” Computer Security conference in Louisville, KY. Take a look at the following video to view the talk in its entirety. The rest of the conference videos are available here.