Archive for Blog

Palo Alto Networks NGFW “SSL Inbound Inspection” with different Certificate

I had a use case where I wanted to use the SSL Inbound Inspection on a Palo, but with a different X.509 certificate than the one on the server itself. That is: the backend server has its self-signed (or internal PKI-signed) certificate along with its…

Continue reading →

Decrypting TLS with Wireshark

Did you know that you can easily decrypt TLS (mostly HTTPS) traffic with Wireshark? Well, only if you have the keys. 😉 This really is a game-changer if you’re stuck with troubleshooting encrypted data. Let’s do an example: TL;DR: You can decrypt TLS traffic with…

Continue reading →

Introducing FortiNite: Fortinet’s Low‑Latency Power‑Up for Fortnite

After years of customers confusing Fortinet with Fortnite, the two companies finally decided to lean into the chaos. The result: FortiNite — a joint innovation designed to deliver “next‑gen latency acceleration” for Fortnite players worldwide, a groundbreaking collaboration with Epic… Source link Author: legendary Johannes…

Continue reading →

Protocol Independent Multicast (PIM) Capture

You never stop learning. One topic that hadn’t crossed my path in the past decade is: Multicast. Whew. Alongside all the technical literature, online presentations, and various blog posts, I decided to approach it the classic way – through packet captures. 😉 So here’s a…

Continue reading →

Multicast Routing w/ Palo

A rare use case on a Palo (at least from my point of view): Multicast Routing. And it can become as complex as you want. Fortunately, the basics are relatively easy to configure, at least if you have a rough understanding of multicast and routing…

Continue reading →

Don’t Trust Packet Captures on Firewalls

The other day, I was troubleshooting some network-related stuff, using the built-in Packet Capture on a Palo Alto Networks firewall. And while it did the job at a first glance, I stumbled upon some packets that were simply not correct, read: were not present on…

Continue reading →

OSPFv3 Authentication on a Palo Alto (Logical Router)

I had a hard time figuring out how to configure OSPFv3 authentication on a Palo Alto Networks NGFW due to its different configuration formats compared to a Cisco router. TL;DR: The SPI must be set in hexadecimal, while the actual key (40 chars, hexadecimal) must…

Continue reading →

DNS Tunneling: iodine

This post guides through a basic DNS tunneling setup with the usage of the appropriate tool “iodine“. It shows how DNS tunneling works and lists the commands needed to run this type of attack. That is, you can tunnel IPv4 packets through this DNS channel…

Continue reading →

Page 1 of 10 1 2 3 4 5 ... Last →