Roll your own DNS blackhole with bind and a little bit of scripting.
Roll your own asa_facts module with splits and slices.
The Cisco PSIRT openVuln API was released at the end of 2015 and I stumbled across it in 2016 and have written numerous post and scripts which access it. However a some point in the last three years access to the API has been restricted and a "Service Partner Contract" is now required. This means... Continue Reading →
Evaluation of different methods for accessing a REST API. Methods tested include Curl, Postman, Python - requests and Python - openVulnAPI.
A Python script using the Cisco PSIRT API to collect vulnerability information on a static inventory file.
Whilst completing my studies for the JNCIA-Junos exam I was trying various configuration on my SRX110 and decided to expose it to the internet as my LAN 'DMZ host', after a little while I noticed the log filling up with messages like these: Feb 14 11:24:24 2018 CS7-SRX01 sshd: SSHD_LOGIN_FAILED: Login failed for user 'root'... Continue Reading →
Python script combining APIC-EM uniq and PSIRT APIs.
Python APIC-EM script for software inventory
During a recent Nexus 5k upgrade task Layer3 features were preventing non-disruptive ISSU’s from taking place. It became apparent that some N5Ks had unused features/ applications installed and the licenses deployed across the estate were unknown. So I wrote a Python APIC-EM script to audit and download this information. The script has the following flow/... Continue Reading →