Fortigate has iperf client for traffic testing built in, here are all the details

Starting with the FortiOS 5.x Fortinet have a built-in iperf3 client in Fortigate so we can load test connected lines. If new to iperf, please read more here iperf.fr. iperf in Fortigate comes with some limitations and quirks, so let's have a better look at them: - The version …



MRV Optiswitch OS904 OS906 OS912 debug and diagnostic commands

MRV Communications (acquired in 2017 by ADVA Optical Networking) is an Israeli company known for their optical network equipment, most notably their Optiswitch Carrier Ethernet Switch series. The switches (OS904, OS906G, OS912) are not available for purchase from them anymore, but if you work for a telco company, you surely …



Fortigate ssh access with public key authentication

Entering each time username and password isn’t fun when doing it daily to the same equipment. Saving password in some automated script (Paramiko, Expect, etc) is not very secure per se. Using the SSH private/public key pair, on the other hand, answers all the needs – easy, secure, time …



HIEW tutorial hexadecimal editor part 6 using HEM modules

Commands used in the video: Command Action F11 To open dialog window displaying the list of available on this PC modules F9 Unload previously loaded module, making it inactive Enter Once pointing on the highlighted module pressing Enter loads and runs it See also other posts in the series: Part …



Checkpoint How to use R80.10 API for Automation and Streamlined Security webcast main points

Just took part in the webcast by Checkpoint How to use R80.10 API for Automation and Streamlined Security and here are some thoughts about it. API is all about working with Management server (but read on) We can set some things on a firewall Gateway as well via API …



HIEW tutorial hexadecimal editor part 5 using Crypto module to program a keygen

Commands used in the video: Command Action F3 + F7 Open the Crypto window to start entering ASM commands to be run by HIEW on the file contents Ctrl + F7 Re-open the Crypto window to change the commands F7 Apply the entered commands to the data at the current cursor position …



HIEW tutorial hexadecimal editor part 3 Navigation

Commands used in the video: Commands Action F8 + F5 jump to the Entry Point in the program. Shift + "+" Add a bookmark at the current cursor position. Alt + 1 / Alt + 2 / Alt + nn Jump to the 1st, 2nd , nn-th bookmark. Alt + "-" Remove the bookmark at the current position. Alt + 0 Remove …



HIEW tutorial hexadecimal editor part 4 encrypting decrypting with XOR

Commands used in the video: Command Action F3 + F8 Set the XOR ASCII/Hex string to be used as a key to XOR with the file data F8 Apply 1 step of XOR operation to the data at the current cursor position. cryptopals.com challenge Challenge used as an example …



Binary obfuscation - String obfuscating in C

The first step in reversing any binary for any purpose is to try and elicit any meaningful information that is most easy to retrieve. One such information is clear text strings in the binary. They may disclose a lot of information if the programmer did not take care to remove …



How to manually install Security Policy via cli on Checkpoint Gaia.

The usual way to install a policy is by clicking Install in the SmartDashboard of course, but if need arises to do so from the command line of the Checkpoint Management server we do it this way: fwm load