Ephemeral Source Port Selection StrategiesEnumeration of a variety of default ephemeral port usage and source port selection strategies known to be used by a variety of systems.
SSH Password Authentication: Threats and CountermeasuresSecure Shell (SSH) is the most trusted cryptographic network protocol for accessing systems securely over untrusted networks, thus it is one of the most targeted services on the internet. This white paper allows operators to explorer appropriate SSH configurations and countermeasures to protect their infrastructures.
VNC: Threats and CountermeasuresVirtual Network Computing (VNC) is a commonly used remote control protocol that allow remote access to a Graphical User Interface (GUI) of a host system. VNC implementations are often susceptible to session hijacking and other brute force password attempts. This white paper addresses VNC configurations and countermeasures in order to assist in protecting this entry point.