Need help locking down and auditing a network
Trying to help a friend (not my network) on locking down his network and gain some visibility on what is going on. Main needs: Audit on file transfers across network and for anything that leaves the...
View ArticleHow to start learning Security Auditing using Windows Powershell? [on hold]
I have come to know that Powershell is a powerful security auditing tool but I need some resources, names of some broader areas whose security audit can be conducted using Powershell. I know that this...
View ArticleWhy were hyperlink auditing pings used for DDoS attacks and not any other...
A few days ago this new story has been published: Researchers have found that the HTML feature called hyperlink auditing, or pings, is being used to perform DDoS attacks against various sites. This...
View ArticleHow reliable is rpm –verify when auditing package integrity and what...
Currently to verify package integrity, the command rpm --verify is run. In reading the rpm manual (http://ftp.rpm.org/max-rpm/s1-rpm-verify-output.html), there is no indication as to the veracity of...
View Articlelinux ssh user activity auditing
hai friends please respond immediately for the below question… i want the information about each and every user activity and what commands he executed in centos7 server with time stamp … and user login...
View ArticleSpring Data JPA Auditing not working for the JpaRepository update method with...
I am working on Spring Data JPA and Postgres example. In this example, I’ve implemented Auditing by following link: https://www.baeldung.com/database-auditing-jpa and Spring Boot JPA@CreatedDate...
View ArticleTool to prepare report of security auditing
I was doing dorking on my friend’s website to make sure there is no leak of information that is not meant to be. I found domains and sub-domains in search results. Is their a tool which can help me to...
View ArticlePassword Auditing Query
The IT Security department is getting audited and the auditor had approached our IT Security team and requests to see results of the password review process, which compares existing database of...
View ArticleJBoss EAP Security Auditing Advice
We are sorting our logging and I am deciding on whether to audit JBoss EAP7. We have an application running on a 3 tier architecture (Apache/JBoss/DB). From a security perspective, what logs would I...
View ArticleDisable auditing of select statements
Somehow the auditing of select statements was enabled in our oracle database. We have several data processing apps that are generating upwards of 15 GB per day in the audit trail. Now we cannot turn...
View Article
More Pages to Explore .....