Gain additions ip location precision using traceroute

When performing IP geolocation on user IP addresses, it can be challenging to achieve meaningful precision because users are often assigned random IP addresses by DHCP.
One way to overcome this problem is to use the traceroute command on the IP in question. Instead of geolocating the user’s IP address directly, you can geolocate the last routing hop’s IP address, which can yield much better results. The reason this method works better is that routing infrastructure tends to be more stable and consistent over time, as opposed to constantly changing user IP addresses.
However, one major drawback of this technique is that most routing traffic infrastructure blocks ICMP packets, which are essential for traceroute to function correctly. As a result, you might be unable to obtain the routing IP address in some cases, limiting the effectiveness of this approach.

Read More

Install rita on firewalla

Firewalla Gold is already running Bro/Zeek on the device. To enhance your network security analysis capabilities, you can integrate RITA (Real Intelligence Threat Analytics) into your Firewalla Gold setup. RITA is an open-source framework designed to detect and analyze network intrusions by processing Bro/Zeek logs. In this blog post, we’ll walk you through the steps to install MongoDB and RITA, and configure the system to import Bro/Zeek logs using a cron job.

Read More

Stack Based buffer overflows on linux x86

For code to be executed in CPU it need to first reverse a stuck or buffer in the memory. The idea behind Buffer overflow is inserting more data input a input field then the program expected, there by overflowing the buffer that have been created and write to other registers. The goal here for a hacker is to overwrite the return address with code to execute commands as the program.

Read More