Roll your own DNS blackhole with bind and a little bit of scripting.
Roll your own asa_facts module with splits and slices.
The Cisco PSIRT openVuln API was released at the end of 2015 and I stumbled across it in 2016 and have written numerous post and scripts which access it. However a some point in the last three years access to the API has been restricted and a "Service Partner Contract" is now required. This means... Continue Reading →
Evaluation of different methods for accessing a REST API. Methods tested include Curl, Postman, Python - requests and Python - openVulnAPI.
A Python script using the Cisco PSIRT API to collect vulnerability information on a static inventory file.
Whilst completing my studies for the JNCIA-Junos exam I was trying various configuration on my SRX110 and decided to expose it to the internet as my LAN 'DMZ host', after a little while I noticed the log filling up with messages like these: Feb 14 11:24:24 2018 CS7-SRX01 sshd: SSHD_LOGIN_FAILED: Login failed for user 'root'... Continue Reading →
The source file has grown by some 53 lines so what have we gained: A more colourful palette, the values of which are pre-computed for each possible iteration value: palette = new int[MAX_ITER]; for (int i = 0; i<palette.length; i++) palette[i] = java.awt.Color.HSBtoRGB(i/256f, 1, i/(i+8f)); The ability to zoom in and out of the set... Continue Reading →
Being a Java luddite who still defaults to Swing I thought it was time to learn something new. Here's a set of tutorials combing JavaFX with the GUI favourite the Mandelbrot fractal. I won't dwell on the function f(z)=z2 +C other than to say the JDK doesn't support Complex numbers, so the initial method looks... Continue Reading →
Python script combining APIC-EM uniq and PSIRT APIs.