Posts by Rapid7

3 min Automation and Orchestration

Understanding GRE (2/2)

Synopsis: In the last post [/2017/01/30/understanding-gre/], I talked about the GRE tunnels, it’s Class of Service and the Firewall Filters it offers.  The next step is to learn about the simplest way to configure a tunnel between two sites using GRE.  This article aims to give understanding about the Configuration of GRE Tunnels for Juniper Networks. Pre-requisites: Before we go in the actual configuration, here is a checklist that you must have before configuring your GRE tunnel between sites

3 min Automation and Orchestration

Basics of IPsec

What is IPsec? IPsec is a framework of related protocols that secure communications at the network or packet processing layer. It can be used to protect one or more data flows between peers. IPsec enables data confidentiality, integrity, origin authentication and anti-replay. Why was IPsec created? There was a dire need of communicating data packets securely over large public WAN (mainly Internet). The solution was development of many networking protocols among which IPsec is one of the most de

2 min Komand

InfoSec Valentines: Show a Security Nerd How Much You Care

It's no secret that we ❤️ security defenders. And while we typically show our love through helpful insights and technique-driven articles, there's just something about this time of year that makes us want to display it in an entirely different fashion. We present to you infosec valentines! We know this isn't a new phenomenon [https://twitter.com/search?q=%23infosecvalentines&src=typd], but with all the doom and gloom that winter brings, creating and sharing infosec valentines got us excited. S

4 min Automation and Orchestration

Fine Tuning Your Intrusion Detection System to Minimize False Positive Alerts

Monitoring and protecting your company’s assets is one of the most important jobs you can perform. It can be tedious sometimes, but overall it can have the biggest impact to the business if compromised. Having alerts set up in your SIEM [https://www.rapid7.com/fundamentals/siem/], IDS and FIM solutions [https://www.rapid7.com/solutions/file-integrity-monitoring/] can ultimately keep you on track. Eliminating false positive results can be a whole different story. Being able to pick out false pos

3 min Automation and Orchestration

Understanding Generic Routing Encapsulation (GRE) (1/2)

Synopsis To transport packets in a private and secure path over a public network, we use the process of encapsulating packets inside an IP encapsulation protocol. GRE follows this protocol and sends packets from one network to another through a GRE tunnel. In this blog, we will understand what is encapsulation, the CoS of GRE and firewall filters in GRE. Understanding GRE – Generic Routing Encapsulation What is encapsulation? The general internal representation of an object or data or packet is

6 min IT Ops

5 Rules of Pair Programming Etiquette

I like Pair Programming [https://en.wikipedia.org/wiki/Pair_programming]. I’ve been doing it episodically for about 10 years. Whenever I’ve pair programmed, at the end of a session, I’ve always walked away a better developer than when I started. However, the practice can be expensive when the pair doing the programming are not efficient. When a lot of friction exists between the two coders involved, costs can exceed double that of a single programmer trying to hash things out on his or her ow

5 min Komand

How to Automate Response to Endpoint Threats with Sysdig Falco, Splunk, Duo, and Komand

Many security teams use endpoint threat detection solutions to detect and respond to threats like malware, credential theft, and more. In a common architecture using a SIEM or Log Management solution, alerts from endpoint detection products can be managed and correlated with telemetry from other solutions or logs, and validated: Generally, a human being has to get involved anywhere from the third step forward. Can we do better? Using a typical architecture with a real endpoint threat detecti

5 min Automation and Orchestration

Two Factor Authentication Methods and Technologies

Synopsis Authentication is a critical step that forms the basis of trust on the Internet or any network based transactions. To state simply it verifies that the person or entity is who they claim to be. However authentication mechanisms are constantly under attack. Two Factor Authentication is an evolution to counter these security threats. This tutorial takes a look at various types of authentication methods and technologies behind them. Different Types of Authentication Factors Three distinct

3 min Komand

The Most Repetitive Tasks Security Analysts Perform

It’s not very productive to come into work day in and day out just to perform the same task dozens of times when you were trained to hunt threats and remediate complex problems. The repetition of rote tasks like IP scoring, alert monitoring, and URL lookups can be fatiguing and dissatisfying, which, as major security breaches show [http://www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712] , can cause alerts to slip through the cracks and threats to get in

4 min Komand

Introducing Komand’s Security Orchestration and Automation Platform

It was just a few months ago when we launched our beta program. And with beta users working within our security orchestration and automation platform [https://www.rapid7.com/solutions/security-orchestration-and-automation/], we built out new features, refined others, and overall fortified our solution. We validated that security teams not only want to save time, increase productivity, and streamline operations, they also need a tool that would allow them to add automation to their security work

3 min Komand

The 3 Things You Need in Place to Successfully Leverage Security Orchestration and Automation

In a time where security is becoming a board-level discussion and threats are affecting not only big businesses, but small ones too, many security teams are scrambling to keep up. But keeping up with a mounting number of threats requires massive efficiencies and a proactive security posture. The way to achieve both of those simultaneously is through security orchestration and automation [https://www.rapid7.com/solutions/security-orchestration-and-automation/]. By this point you’ve probably hear

2 min IT Ops

Java 8 - Lazy argument evaluation

Overview “I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates Lazy evaluation is an evaluation strategy [https://en.wikipedia.org/wiki/Evaluation_strategy] which delays the evaluation of an expression until its value is needed. The opposite of this is eager evaluation, where an expression is evaluated as soon as it is bound to a variable.[wikipedia [https://en.wikipedia.org/wiki/Lazy_evaluation]] Like most imperative programming l

5 min Intrusion Detection

The Pros & Cons of Intrusion Detection Systems

Network Intrusion Detection System (NIDS) A network intrusion detection system (NIDS) can be an integral part of an organization’s security, but they are just one aspect of many in a cohesive and safe system. They have many great applications, but there are also weaknesses that need to be considered. It is important to compare an NIDS against the alternatives, as well as to understand the best ways to implement them. What Is an Intrusion Detection System? Intrusion detection systems [https://ww

6 min Automation and Orchestration

How to Install Snort NIDS on Ubuntu Linux

Synopsis Security is a major issue in today’s enterprise environments. There are lots of tools available to secure network infrastructure and communication over the internet. Snort is a free and open source lightweight network intrusion detection and prevention system. Snort is the most widely-used NIDS (Network Intrusion and Detection System) that detects and prevent intrusions by searching protocol, content analysis, and various pre-processors. Snort provides a wealth of features, like buffer

3 min Automation and Orchestration

Introduction to Incident Response Life Cycle of NIST SP 800-61

Synopsis In the series of blog posts titled “Incident Response Life Cycle in NIST and ISO standards” we review incident response life cycle, as defined and described in NIST and ISO standards related to incident management. In previous article [/2017/01/11/recommendations-for-incident-response-team-included-in-nist-special-publication-800-61/] in this series we reviewed NIST’s approach to incident response team and explained how security automation can help mitigate issues related to building a