Howtos / Articles

Mikrotik RouterOS Remote Vulnerability Exploiting the Winbox Service.

It was discovered on the 23rd of April 2018, that there was a remote vulnerability being exploited in the wild, that is exploiting the Winbox service on RouterOS based devices (Mikrotik / Routerboard devices). This is currently effecting RouterOS versions v6.29 through to v6.42 in the current channel (and up to v6.43rc3 in the release candidate channel). Version 6.42.1 for current (and v6.43rc4 for release candidate), has just been released, which has fixed this vulnerability, and should be upgraded to…

Read more [...]

Secure MikroTik RouterOS Router via CLI

Mikrotik RouterOS devices are extremely powerful router devices. This can sometimes mean that the configuration of them isnt as simple as point and click for a new user. This howto will outline some recommended steps you can take to secure your Mikrotik RouterOS device, be it RouterBoard, a x86 install on bare metal, or a CHR (Cloud Hosted Router). This guide will not go into detail on configuring the firewall. That is more complex and is going to be heavily…

Read more [...]

Force .Net Application to run as 32 bit

If you have a .Net application that has been compiled with the target CPU option set to AnyCPU (as opposed to x86 / 32bit or x64 / 64bit specifically) and you are running a 64bit operating system, that application will automatically run as a 64bit process. If you run it on a 32bit machine, it will run in a 32bit mode. You can however change the CorFlags of the executable, to force it to run as a 32bit process, even…

Read more [...]

Generate SSH Keys on Windows with PuTTYGen (the PuTTY Key Generator)

To generate SSH public and private key pairs on Windows, one of the easiest tools to use, is the PuTTY Key Generator “puttygen.exe” (which can be downloaded from here). The resulting generated files from the PuTTY Key Generator can be used to set up public key authentication with a remote server, allowing for more secure authentication over normal password based authentication (requires disabling password based authentication). Download the PuTTY Key Generator You can download puttygen from the following url:…

Read more [...]

Using SSH Private Key Files with PuTTY

The following guide shows you how to log into a remote server using your private key file. It assumes you already have the associated public key already added into the remote hosts authorized_hosts file. Download PuTTY Download PuTTY if you don’t have it installed yet. You can download PuTTY from the following url: Open PuTTY Run Putty. You should be presented with a screen like this: Enter in the host name or IP address of the host you want…

Read more [...]

Page 1 of 4212345678910...2030...Last »