|Data Reporters: Sources of insight for your own network
||Explanation and listing of data reporters for network operators to explore and understand potential problems originating from their networks.
|Ephemeral Source Port Selection Strategies
||Enumeration of a variety of default ephemeral port usage and source port selection strategies known to be used by a variety of systems.
|SSH Password Authentication: Threats and Countermeasures
||Secure Shell (SSH) is the most trusted cryptographic network protocol for accessing systems securely over untrusted networks, thus it is one of the most targeted services on the internet. This white paper allows operators to explorer appropriate SSH configurations and countermeasures to protect their infrastructures.
|VNC: Threats and Countermeasures
||Virtual Network Computing (VNC) is a commonly used remote control protocol that allow remote access to a Graphical User Interface (GUI) of a host system. VNC implementations are often susceptible to session hijacking and other brute force password attempts. This white paper addresses VNC configurations and countermeasures in order to assist in protecting this entry point.