A Little bit of Fortigate Forensics

Sometimes, one wants to see whats going on on an embedded device, or maybe, what might have been going on in the past. For reliability and stability reasons, this is often not possibe as the UI provided by a device is there to protect the user from themselves. Yes, they might know what their doing, but it will break during the next update! In return, the limitations resulting from a specific UI, make deeper insights harder. Luckily, Fortigate firewalls allow certain deeper going access. Here an inisight into what is possible, how, and a little script to help, when scraping potential IoCs from the devices, or just comparing them to a known good state!

[Read More]

Summarizing Fortigate Configs

So I recently had to read through a few ten-thousand lines of Fortigate configs. Fun - No! But necessary. To make things a little easier and not having to do it all twice I wrote a small python script, creating a summary of the config. While not replacing a full manual assessment, it does make life easier!

[Read More]

Causing Irritation, by doing things ?correctly?

So, somehow, I feel like often causing irritation by turning around, looking for an Ikea Samla Box, of which I now have just under 200, and quickly do a PoC, prove a point or find a reference. While others are often irritated that I have everything here, I’m irritated that they don’t. Here a few thoughts…

[Read More]

A Poor Man’s Perimeter Security

A few years back, mainly out of frustration, I developed something that started as a poor man’s asset management system for a company’s perimeter, which turned into a poor man’s perimeter Security tool. Right now, I’m doing the same again, so I guess it’s time to do a short write up.

[Read More]

Overkill Home Network

I’m often told my home network is typical me and far to complex. For me it’s just as complex as necessary, as I honestly don’t have very much time to invest. Here a few notes on how I got here and why

[Read More]

ePA

The German elektronische PatientenAkte or electronic patient file is a central approach, storing notes from all doctors on all generally insured patients in a central, more or less, secure place. Sadly it’s just having a rough start with risk analysis excluding nation state attackers and various proven attack vectors. I did a small writeup for friends and familiy which I didn’t want to share openly, but well, it sadly seems necessary.

[Read More]

Custom Cards & IDs @H2HC

As already mentioned on various channels, I brought a fun little card printer with me to this year’s H2HC in Sao Paulo. Here a little bit of information on getting something printed!

[Read More]

One Day Pentest

Back in 2019 I gave a presentation at hardwear.io titled “Day One with a TTIG-868” . My talk was aimed at two aspects: An insight into device, I was curious as I had seen multiple commercial LoRaWAN gateways before and sharing the concept of single day security tests. Right now, I’m back at the point to want to stress the method as a potential quality assurance approach.

[Read More]