• Hyper-V Concepts

    It's time to get familiar with Hyper-V Virtualization, virtual servers, virtual switches, virtual CPUs, virtual deployment infrastructure (VDI) and more.
    Read more

    Hyper-V Installation

    Learn how to install and monitor the Windows 2012 Hyper-V platform via Server Manager & Windows PowerShell

    read more

Hot Downloads

How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting & Data Export

Posted in Cisco Routers - Configuring Cisco Routers

How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting & Data Export - 5.0 out of 5 based on 1 vote

If you’re tired of setting up SPAN sessions to capture network traffic transiting your network and Cisco router, it’s time to start using Cisco’s Embedded Packet Capture (EPC), available from IOS 12.4.20T and above. We will show you how to configure Cisco’s Embedded Packet Capture, to capture packets transiting a Cisco router, save them to its flash disk or export them directly to an ftp/tftp server for further analysis with the help of a packet analyzer such as Colasoft Capsa or Wireshark.

We’ve selected to Colasoft Capsa as our packet analyzer because of its amazing breakdown and presentation of captured packets. 

Finally, we've also included a number of useful Embedded Packet Capture troubleshooting commands to monitor the status of the capture points and memory buffer.

Let’s take a look at some of the basic features offered by Embedded Packet Capture:

  • Capture IPv4 and IPv6 packets in the Cisco Express Forwarding path
  • Ability to specify various capture buffer parameters
  • Export packet captures in PCAP format, enabling analysis with external tools such as Colasoft Capsa, Wireshark.
  • Display content of the capture buffer
  • Granularity of captured packets via Standard or Extended Access Control Lists (ACLs)

 

cisco-router-embedded-packet-capture-1Figure 1. Understanding Basic Embedded Packet Capture Terminology

Before we dive into the configuration of Cisco EPC, let’s explain the two terms used during the EPC configuration:  Capture Buffer & Capture Point.  We’ll use figure 1 to help illustrate the terms.

Capture Buffer

Capture buffer is an area in memory for holding packet data.  There are two types of Capture Buffers: Linear and Circular.

Linear Capture Buffer: When the capture buffer is full, it stops capturing data.
Circular Capture Buffer: When the capture buffer is full, it continues capturing data by overwriting older data.

Capture Point

Capture point is a traffic transit point where a packet is captured. Capture points need to define the following:

  • IPv4 or IPv6
  • CEF (Cisco Express Forwarding or Process-Switched
  • Interface e.g Fast Ethernet0, Dialer0 etc.
  • Direction of traffic to the interface: in (ingress), out (engress) or both

 

Configuring Cisco Embedded Packet Capture

EPC configuration is an easy 5 step configuration process. Examining the diagram below, our goal is to capture ingress & egress packets on interface FastEthernet0 from workstation 192.168.3.2 to and from Firewall.cx:


cisco-router-embedded-packet-capture-2 Figure 2. Capturing packets betwen host 192.168.3.2 and Firewall.cx

Note: None of the below configuration commands, except the optional access lists (filters), will be stored in the router's running-configuration or startup-configuration. 'Monitor' commands are only stored in the router's RAM and are lost after a router reboot.


STEP 1 -   Define a Capture Buffer

WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker

Posted in Security Articles

WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker - 4.0 out of 5 based on 1 vote

netsparker-discovery-wordpress-dom-xss-scripting-vulnerability-18th of May 2015, Netsparker annouced yesterday the discovery of critical security vulnerability contained an HTML file found on many WordPress themes, including WordPress.org hosted websites. As reported by Netsparker the specific HTML file is vulnerable to cross-site scripting attacks and session hijack. WordPress.org has already issued an official annoucement and patch (v4.2.2) and recommends WordPress administrators update their website files and themes.

The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on WordPress.org (including the Twenty Fifteen default theme) have been updated yesterday by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of Netsparker.

Download & Scan your site with Netsparker for security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS)

By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. As seen from the XSS example in Netsparker's article, if a web application is vulnerable to cross-site scripting and the administrator’s session is hijacked, the malicious hacker exploiting the vulnerability will have full admin privileges on that web application.

Related Security Articles

Netsparker, a leading web application network security scanner finds and reports security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities, hence it is the first and only False Positive Free web application security scanner.

Configure Windows 8 & 8.1 To Provide Secure Wireless Access Point Services to Wi-Fi Clients - Turn Windows 8 into an Access Point

Posted in Windows 8 & Windows 8.1

Configure Windows 8 & 8.1 To Provide Secure Wireless Access Point Services to Wi-Fi Clients - Turn Windows 8 into an Access Point - 5.0 out of 5 based on 2 votes

windows-8-secure-access-point-1-preWindows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wireless access point, allowing wireless clients (including mobile devices) to connect to the local network or Internet. This feature can save you time, money and frustration when there is need to connect wireless devices to the network or Internet but there is no access point available.

In addition, using the method described below, you can turn your Windows system into a portable 3G router by connecting your workstation to your 3G provider (using your USB HSUPA/GPRS stick).

Windows 7 users can visit our article Configuring Windows 7 To Provide Secure Wireless Access Point Services to Wi-Fi Clients - Turn Windows into an Access Point

To begin, open your Network Connections window by pressing Windows Key + R combination to bring up the Run window, and type ncpa.cpl and click OK:

windows-8-secure-access-point-1
Figure 1. Run Command – Network Connections

 The Network Connection window will appear, displaying all network adapters the system current has installed:

windows-8-secure-access-point-2
Figure 2. Network Connections

Let’s now create our new wireless virtual adapter that will be used as an access point for our wireless clients. To do this, open an elevated Command prompt (cmd) by right-clicking on the Window 8 start button located on the lower left corner of the desktop and select Command Prompt (Admin). If prompted by the User Account Control protection, simply click on Yes to proceed:

windows-8-secure-access-point-3
Figure 3. Opening an elevated Command Prompt

Once the command prompt is open, enter the following command to create the wireless network (SSID). The encryption used by default is WPA2-PSK/AES:

Revealing & Backing Up Your Windows 8 – Windows 8.1 Pro License Product Key

Posted in Windows 8 & Windows 8.1

Revealing & Backing Up Your Windows 8 – Windows 8.1 Pro License Product Key - 5.0 out of 5 based on 1 vote

windows-8-backup-license-product-key-1aBacking up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine Microsoft Label or Certificate Of Authenticity (COA) containing the product key, is placed in an area not easily accessible by users e.g inside the battery compartment in newer ultrabooks/laptops, making it difficult to note the product key.

In this article, we’ll show you how to easily download and store your Windows License Product Key inside a text file with just two clicks!

The information displayed under the System Information page in Windows 8 and Windows 8.1 (including professional editions), includes the Windows edition, system hardware (CPU, RAM), Computer name and Windows activation status. The Windows activation status section shows us if the product is activated or not, along with the Product ID:

windows-8-backup-license-product-key-1

Figure 1. System Information does not show the Product Key

Product Keys and Product IDs are two completely different things, despite the similarity of the terms.

The 20 character Product *ID* is created during the installation process and is used to obtain/qualify for technical support from Microsoft and is of no use during the installation process.

Installing The ‘Unsupported’ Profilic USB-to-Serial Adapter PL-2303HXA & PL-2303X on Windows 8 & 8.1

Posted in Windows 8 & Windows 8.1

Installing The ‘Unsupported’ Profilic USB-to-Serial Adapter PL-2303HXA & PL-2303X on Windows 8 & 8.1 - 4.7 out of 5 based on 3 votes

profilic-pl2303-driver-installation-windows8-1aThanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as they are used to perform the initial configuration of a variety of Cisco equipment such as routers, catalyst switches, wireless controllers (WLC), access points and more, via their Console Port. The most common USB-to-Serial adapters in the market are based on Profilic’s PL2303 chipset.

With the arrival of Windows 8, Windows 8.1 and upcoming Windows 10, Profilic has announced that these operating systems will not support USB-to-Serial adapters using the PL-2303HXA & PL-2303X chipsets, forcing thousands of user to buy USB-to-Serial adapters powered by the newer PL-2303HXD (HX Rev D) or PL2303TA chipset.

The truth is that PL-2303HXA & PL-2303X chipsets are fully supported under Windows 8 and Windows 8.1 and we’ll show you how to make use of that old USB-to-Serial adapter that might also hold some special sentimental value.

Make sure to download our Profilic Windows 8/8.1 x64bit Drivers from our Administrative Tools section

We took our old USB-to-Serial adapter and plugged it in our ultrabook running Windows 8.1. As expected, the operating system listed the hardware under Device Manager with an exclamation mark:

profilic-pl2303-driver-installation-windows8-1Figure 1. Prolific Adapter in Device Manager

 

A closer look at the properties of the USB-to-Serial adapter reveals the popular Code 10 error which means that the device fails to start:

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup