Attack vector | What phishers try | How passkeys stop them | Technical reason |
---|---|---|---|
Fake domain / look-alike site | Lure user to compannyy.com and steal typed credentials |
No credentials to steal – the browser/OS will not present the passkey unless the domain exactly matches the one registered (company.com ) . |
|
Man-in-the-middle / proxy phishing | Intercept login traffic between user and real site |
@echo off | |
setlocal EnableDelayedExpansion | |
call :InitColors | |
if "%~1"=="" goto usage | |
if /i "%~1"=="--help" goto usage | |
if /i "%~1"=="-h" goto usage | |
if /i "%~1"=="/?" goto usage |
<!DOCTYPE html> | |
<html> | |
<head> | |
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js"></script> | |
<script type="text/javascript" src="https://www.gstatic.com/charts/loader.js"></script> | |
</head> | |
<body> | |
<div id="chart" style="width:auto; height:300px;"></div> | |
</body> |
# | |
# OpenSSL example configuration file. | |
# This is mostly being used for generation of certificate requests. | |
# | |
# Note that you can include other files from the main configuration | |
# file using the .include directive. | |
#.include filename | |
# This definition stops the following lines choking if HOME isn't |
Unfortunately, the Cisco AnyConnect client for Mac conflicts with Pow. And by "conflicts", I mean it causes a grey-screen-of-death kernel panic anytime you connect to the VPN and Pow is installed.
As an alternative, there is OpenConnect, a command-line client for Cisco's AnyConnect SSL VPN.
Here's how to get it set up on Mac OS X:
-
OpenConnect can be installed via homebrew:
brew update
brew install openconnect
:: Windows 10 Hardening Script | |
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering. | |
:: Obligatory 'views are my own'. :) | |
:: Thank you @jaredhaight for the Win Firewall config recommendations! | |
:: Thank you @ricardojba for the DLL Safe Order Search reg key! | |
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings! | |
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater | |
: |
This note describes how to connect two networks/devices/VMs over public network using Wireguard with Layer 2 support (ARP, IPv6 link-local, etc).
This can also be achieved using SSH and its "tap" tunnel, however, it does not provide the same level of latency and bandwidth as full-blown VPN such as Wireguard.
In addition, this note describes how to tunnel Wireguard over TCP connection. This may be of use if you encounter firewall in-between so, for instance, you can use TCP port 443 only.
server: | |
########################################################################### | |
# BASIC SETTINGS | |
########################################################################### | |
# Time to live maximum for RRsets and messages in the cache. If the maximum | |
# kicks in, responses to clients still get decrementing TTLs based on the | |
# original (larger) values. When the internal TTL expires, the cache item | |
# has expired. Can be set lower to force the resolver to query for data | |
# often, and not trust (very large) TTL values. | |
cache-max-ttl: 86400 |
Scripts to confgire a group of hosts on a LAN to use VXLAN over Wireguard.
License BIG-IP VE¶
You must enter license information before you can use BIG-IP VE.
-
Open a web browser and log in to the BIG-IP Configuration utility by using
https
with the external IP address and port8443
, for example:https://<external-ip-address>:8443
.The username is
admin
and the password is the one you set previously. -
On the Setup Utility Welcome page, click Next.