Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for 'Josh Michaels'

articlesecurityapplicationsus April 10, 2013 by Josh Michaels
Live from Hackcon 8  in beautiful Oslo, Norway.    The conference is half through the first day, with loads of great presentations already done. The morning started off strong with the ever energetic Georgia Weidman presenting on Mobile devices in penetration tests. My mental summary...  mobile devices are not outside the scope of pentests. Smart phones = Computer that people forget is a computer. I unfortunately missed Stefano Zanero's presentation on the use of&nb...
articlesecurityus December 18, 2012 by Josh Michaels
What a weekend. I had the privilege of coordinating the inaugural Security Bsides event saturday. First off, a major shout out to the entire org team, sponsors, speakers, and most importantly the community, that made it possible. What is Bsides? Some call it a security conference, but I think it’s so much more than that. The huge mega-conferences provide some great sessions, cool parties, and a chance to have everyone in the same place at the same time. Bsides strives to be a more &ldqu...
On DevCentral we often focus on the out of the box solutions. iRules, iControl, iApps and more are fantastic and exciting technologies, but there's a lot that goes into making an F5 device work before you even get to play with some of those more advanced features. Things like configuring a pool or a virtual server often times get taken for granted on DevCentral, and that is something we'd like to change. The reality is there are many new users coming to the world of F5 all the time, and ...
articlesecurityhardwareus December 03, 2012 by Josh Michaels
In my role as a security monkey, I often find myself in situations where I need to be the “informer of less than pleasant news”. "Yep, that has a XSS vulnerability in it." "If you do it that way, this method can DoS the site." "We need to add X hours of security testing before we deploy " It’s very easy for a security monkey to be seen as the dark cloud. It’s also very easy to start to develop a less than positive view of working with the monkey, which than leads the dev geeks...
Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs. They provide extensive power for security engineers as well. We’ve decided it’s time to revisit the Security iRules 101, with updated content, and 100% more monkeys! In section 4 of the series, let’s talk about DNS.  Domain Name System is the address book of the internet.  Any time you type letters into a browser and hit e...
articlesecurityus November 19, 2012 by Josh Michaels
Recently, a manager, let’s call him Rob, overheard me talking with Sam about an issue he was having with his automobile.  The auto had an inboard dash diagnostic system, but it was pass coded. The dealership and mechanics stated they were not allowed to divulge the code, lest they be terminated/punished. I thought it sounded a little silly and told Sam that I would look around to see if someone might have a clue about accessing it. Rob, always the jester, called out of his office asking “if I wa...
articleirulessecurityadndevnewstechtip November 15, 2012 by Josh Michaels
Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs. They provide extensive power for security engineers as well. We’ve decided it’s time to revisit the Security iRules 101, with updated content, and 100% more monkeys! In section 3 of the series, let’s talk about cloaking. Those of you whose first response was “I canna doit captain, I doona hav the powe”,  get a gold ...
articleirulessecurityadndevnewstechtip November 08, 2012 by Josh Michaels
Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs.  They provide extensive power for security engineers as well. We’ve decided it’s time to revisit the Security iRules 101, with updated content, and 100% more monkeys! In section 2 of the series, we are going to talk about controlling our HTTP. Browser based web communication use the power of RFC 2616 (this plus many others) to tell b...
articlesecurityhardwaretradsecus November 05, 2012 by Josh Michaels
You know, working at F5 has some real perks. Cool gatherings, good workspace and my favorite part, really really REALLY smart people. I often tell people who as why I love working at F5 “The best part about it, is standing up, looking around, and realizing, I am surrounded by really smart, knowledgeable people.” A great example of this came across my virtual desk in the tubes just last friday. A group of our FSE (Field support engineers) and SA’s (Solution Architects) p...
Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs.  They provide extensive power for security engineers as well. We’ve decided it’s time to revisit the Security iRules 101, with updated content, and 100% more monkeys! In our first section of the series, we are going to cover a vital part of the security infrastructure, logging. Good logs make all the difference for identification and...
Page 1 of 4First   Previous   [1]  2  3  4  Next   Last