img
  • Home
  • About
  • Category
  • Contact

Category Archives: Crypto

IPsec VPNs Deep Dive

Establishing an IPsec VPN between two sites or even among multiple sites such as Fortinet's ADVPN.  But do we really…

By Manny Fernandez

February 16, 2026

Extracting Private Key from FortiGate Firewall

Why would you need to export the private key when you create a CSR on the FortiGate.  If for instance,…

By Manny Fernandez

August 30, 2022

Extracting Your Private Key from a .pfx certificate

I had a customer that installed a wildcard certificate on an Exchange server.  Later they wanted to use the same…

By Manny Fernandez

August 30, 2022

What Diffie-Hellman (DH) Group Should I Use

There has been a lot around Diffie-Hellman groups and which ones to use.  Some think that the bigger the DH…

By Manny Fernandez

January 7, 2020

Encrypting a USB Thumb-Drive on macOS from CLI and GUI

There are a couple of ways to encrypt drives and volumes on macOS X.  I recommend that if you are…

By Manny Fernandez

January 1, 2020

Troubleshooting IPSec VPNs on Fortigate Firewalls

Lets start with a little primer on IPSec.  I am going to describe some concepts of IPSec VPNs. IPSec Primer…

By Manny Fernandez

November 12, 2019

IPv6 VPNs in Fortigate Firewalls

I have two Fortigate 140Es in my environment.  SecPrimate-01 and SecPrimate-02.  The SecPrimate-01 is using the Mariner color while the…

By Manny Fernandez

October 20, 2019

Setting Up Tor On macOS

Tor is an Open-Source project created in the 90's by United States Naval Research Laboratory.  Tor give you a level…

By Manny Fernandez

September 18, 2019

Disabling Weak Ciphers on Fortigate Firewalls

A customer of mine sent me an email after having a vulnerability assessment done against his environment.  He got back…

By Manny Fernandez

April 14, 2019

Using OpenSSL to Provision Wildcard Certificate

I have my lab set up with plenty of gear from Fortinet, Cisco, Palo Alto and Checkpoint. In order to…

By Manny Fernandez

January 3, 2019

Categories

  • 2FA (8)
  • AD VPN (3)
  • AI (1)
  • All (332)
  • Apple (29)
  • Authentication (18)
  • AWS (1)
  • Breaches (6)
  • BUG (1)
  • Certificate (13)
  • Checkpoint (2)
  • Cisco (20)
  • Compliance (4)
  • Content Filter (2)
  • Crypto (10)
  • DNS (8)
  • Endpoint (3)
  • FortiAIOps (1)
  • FortiAnalyzer (7)
  • FortiAP (5)
  • FortiAuthenticator (2)
  • FortiClient (9)
  • FortiDeceptor (4)
  • FortiExtender (3)
  • FortiGate (111)
  • FortiManager (5)
  • FortiNAC (5)
  • Fortinet (75)
  • FortiSASE (1)
  • FortiSwitch (11)
  • FortiVoice (2)
  • HA (5)
  • Ideas (1)
  • InfoSec-General (19)
  • IPS (3)
  • LAB (5)
  • LDAP (6)
  • Link (3)
  • Linux (28)
  • Logging (8)
  • macOS (5)
  • MFA (4)
  • Misc (20)
  • NAT (4)
  • Network (34)
  • Obervium (2)
  • OS X (36)
  • OSPF (2)
  • PacketCapture (10)
  • PaloAlto (3)
  • Password (6)
  • Personal (1)
  • Productivity (11)
  • Quick-Tip (3)
  • Routing (8)
  • Scripting (25)
  • SecOPS (3)
  • SIEM (1)
  • SNMP (2)
  • Spotlight (1)
  • SSL (17)
  • SSL Decryption (1)
  • Standard (3)
  • Training (2)
  • Troubleshooting (11)
  • Uncategorized (21)
  • Video (2)
  • VM (2)
  • Voice (3)
  • VPN (43)
  • WiFi (7)
  • Windows (9)
  • Wireshark (1)
  • Workflow (12)

Recent posts

  • At its core, IEEE 802.1X is a network layer... Full Story

  • In case you did not see the previous FortiNAC... Full Story

  • This is our 5th session where we are going... Full Story

  • Now that we have Wireshark installed and somewhat configured,... Full Story

  • The Philosophy of Packet Analysis Troubleshooting isn't about looking... Full Story

img

2021 © InfoSec Monkey