Questions tagged [cisco]
Cisco Systems is an American multinational corporation that designs, manufactures, and sells networking equipment.
92 questions
0
votes
0
answers
33
views
VPN and Deep Packet Inspection [closed]
I’m interested in finding a way to obtain a US IP address for all the traffic generated by my work machine located in another country that employs Deep Packet Inspection (DPI).
However, I have a ...
0
votes
1
answer
130
views
Why does this method of modifying kernel memory work?
I have no experience of kernel programming or anything low level. I just watched this video and at 21:10 the presenter started to talk about modifying kernel memory using two pointers.
From my ...
0
votes
1
answer
408
views
Anyconnect VPN whitelist physical devices [duplicate]
My company uses Anyconnect VPN of Cisco, and any company PC device is required AD username/password to access the network. I'm thinking about the case when an employee copies the whole windows (copy ...
1
vote
0
answers
554
views
Scan sg350-28 with Nessus Credentialed checks
I have 4 SG350 (SG350-28 28-Port Gigabit Managed Switch) switches
I need to be able to do a Credentialed scans to the switches
The problem is when I try to scan it will not connect to port 22, from ...
0
votes
1
answer
969
views
Fingerprinting Cisco ASA Device
I have used Nessus to determine that a client's Cisco ASA is vulnerable to a Read-Only Path Traversal Vulnerability. So far I have tried viewing the logon portal page source code, nmap -sV -A <host&...
2
votes
3
answers
1k
views
Does the use of Cisco AnyConnect Secure Mobility Client cause additional privacy and security risks over operating system VPN?
During the pandemic I work from home on my own devices via the employer’s VPN. I am aware of the usual privacy risks this represents for me.
My employer used to provide a Server Address, Account Name, ...
0
votes
1
answer
192
views
Can Cisco Umbrella be Used Along with Google Classroom?
We are creating an Information Assurance and Security Plan for a public school. The Plan will include Google Classroom because the school doesn’t have an online learning platform. The problem is our ...
1
vote
0
answers
276
views
Seeking Advice/Guidance on configuring VPN to Ubiquiti USG behind Cisco Meraki [closed]
Abstract:
Access the USG network via VPN, through a Meraki MX84.
Summary:
I am currently working on setting up some new hardware and re-configuring a network that I am responsible for.
The objective ...
0
votes
2
answers
484
views
If i connect to a VPN server using cicso anyconnect or PPTP protocol which has invalid certificate, can they sniff my HTTPS data?
Lets say i have connected to a VPN server using Linux with the help of Cisco anyconnect protocol or PPTP protocol.
now when i try to connect to it, it says :
The certificate may be invalid or ...
0
votes
0
answers
231
views
Routing a site-to-site VPN through my regular VPN service
currently engaged in live competitive red vs blue team exercises in an enterprise style Windows AD environment. My device runs a modern Debian Linux OS.
cscotun0
We typically connect to the lab/domain ...
-1
votes
1
answer
508
views
Cisco Anyconnect Company VPN
I am currently working remotely and logging into my machine in the office through Cisco AnyConnect VPN. I was wonder what information can the company see. For example, do they have access to my ...
2
votes
2
answers
3k
views
Help to secure my connection to my company VPN (Cisco AnyConnect)!
I've been searching about VPN for more than an hour, and all the answers I found on this site or others are either confusing or contradicting.
My issue is that I usually access my company VPN through ...
1
vote
0
answers
465
views
Decrypt DTLS traffic when using the Cisco AnyConnect Client
I am using the Cisco AnyConnect Client 4.7 to connect to a VPN. I need to decrypt the traffic to examine the packets and understand how VPN works. I have read about providing the PSK to Wireshark, but ...
0
votes
1
answer
222
views
Network diagram based on Cisco ACL and other firewall rules [closed]
Are there any tools for automated building network diagram from ACL rules or any other firewall rules?
0
votes
1
answer
463
views
Internal HTTP(s) vulnerabilities
We use Rapidfire + network detective where I work, for doing non-intrusive internal scans on all of our clients' networks. Every week; half of the tickets I get for this are port 80/443 ...