Roll your own DNS blackhole with bind and a little bit of scripting.
The Cisco PSIRT openVuln API was released at the end of 2015 and I stumbled across it in 2016 and have written numerous post and scripts which access it. However a some point in the last three years access to the API has been restricted and a "Service Partner Contract" is now required. This means... Continue Reading →
Evaluation of different methods for accessing a REST API. Methods tested include Curl, Postman, Python - requests and Python - openVulnAPI.
A Python script using the Cisco PSIRT API to collect vulnerability information on a static inventory file.
Whilst completing my studies for the JNCIA-Junos exam I was trying various configuration on my SRX110 and decided to expose it to the internet as my LAN 'DMZ host', after a little while I noticed the log filling up with messages like these: Feb 14 11:24:24 2018 CS7-SRX01 sshd: SSHD_LOGIN_FAILED: Login failed for user 'root'... Continue Reading →