Splunk Search Query – Linux Systems Auditing

The auditing of the linux systems is achieved by using the auditd service that is provided by installing audit package. All the system audit log is generated and dumped to /var/log/audit/audit.log. All these audit.log is forwarded to Splunk indexer for indexing this data and then in turn leverage this data to audit the linux systems by using the Splunk search query. We

Read more

SSL Session caching in Apache HTTP Webserver

In this section, we will be looking at couple of stuffs as below : Is SSL Session Caching configured for Apache HTTP Webserver Testing SSL Session Caching (SSL session resumption) Before we start over, lets have a basic understanding of what is SSL session caching and its significance. SSL Session Caching (Session Resumption): It is a performance optimization mechanism that

Read more

Deprecated SSH Cryptographic Settings

Our security scanner Qualys reported the vulnerability “Deprecated SSH Cryptographic Settings” across RHEL6 & RHEL7 fleet servers. The scan report provided description of the threat posed by the vulnerability, recommendation for correcting the problem and the result which shows how Qualys verified the vulnerability. Vulnerability : Deprecated SSH Cryptographic SettingsQID: 38739THREAT: The SSH protocol (Secure Shell) is a method for

Read more