- Details
- Written by Jon Moore
In an earlier article, I went over a few discoveries I made on a Nokia IP260 while trying to install pfSense on it. In the comments, someone wondered if Coreboot would work on it. Not being one to shy away from such a challenge, I dove right in. Here are my findings.
- Details
- Written by Jon Moore
I have been working on a script in my spare time. It is meant to help troubleshoot unspecific connectivity issues where some kind of Checkpoint device is involved. The idea is that you when you experience a connectivity problem, you run this script, do whatever you need to do to get things back up and running, and provide Checkpoint TAC the output file, and they can begin work to determine what went wrong.
- Details
- Written by Jon Moore
So, you want to set up Tails live Linux USB, but for one reason or another, you can't follow the instructucation provided for one reason or another; in my case, due to policy restrictions. What to do? Well, here is an alternative method that should be just as cryptographically secure as the "official" instructions.
- Details
- Written by Jon Moore
Ever want to wreck a $500,000 piece of equipment and not get into trouble? Who doesn't!? I recently got some additional training at work on the Checkpoint 41000 and 61000 series appliances. These are some pretty big and beefy, data center grade appliances. Well, after the training completed, we had a chance to fool around with the device, and here's what I discovered...
- Details
- Written by Jon Moore
Today, we will go over creating a bootable USB with Kali, and an encrypted persitence that is also nukable. What this means, is that the USB itself will be bootable, but all the data will be encrypted. The encryption will not only have a decryption password, but it will also have a Nuke password; put in the Nuke password, and even the correct password will not be able to decrypt it. Read on for the complete how-to.
Page 5 of 9