• Oxford: +44 (0)1865 877830 
  • Manchester: +44 (0)161 713 0176 
  • Edinburgh: +44 (0)131 541 0118 
  • New York: +1 646-781-7580 
  • Minneapolis: +1 612-324-7410 
  • Bucharest: +40 316 301 707 

Blog

You are here

By Mike

CVE-2018-18863 ResourceLink Local File Inclusion

Nov 08, 2018

In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). Continue reading

By Antonio

Combining Issues to Compromise the Domain

Oct 29, 2018

Internal penetration tests, as approached by Dionach, are a good exercise to assess the security of the internal networks of our clients. Continue reading

By Casey

Overview of iOS 12 Security Features

Oct 22, 2018

When deciding whether or not to install iOS 12, many iPhone and iPad users will be primarily concerned with the "flashier" features: Memojis, group FaceTime calls, performance improvement Continue reading

By Freddie

Behavioural Analysis of Malware via Network Forensics

Sep 03, 2018

Most antivirus systems today use signature-based detection in order to identify given binaries as malware. Continue reading

By Oliver

Sophos UTM Firewall Hardening

Aug 16, 2018

Firewalls are used as the main defence for an organisation’s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.  Achors #access_control #central_auth #tacacs #radius #ldap #named_accounts #complexity #lockouts #admin_ports #rules #comments #inactive_rules #explicit_deny #permissive #syslog #high_risk #restrict_outbound Continue reading

By Freddie

The Onion Routing Network Research

Aug 16, 2018

The Tor network is borne out of a research project by the Naval Research Laboratory and Defence Advanced Research Projects Agency called Onion Routing. Continue reading

By Luca

Check Point Firewall Hardening

Aug 09, 2018

Dionach perform a number of firewall reviews and we often have to interact with different technologies and vendors. Alongside Cisco firewalls, Check Point firewalls are a popular solution used by organisations. Continue reading

By Freddie

Malware Anti-Forensics

Aug 02, 2018

Some of the forensic countermeasures used by malware authors are described within this blog post. Continue reading

By Wouter

Cisco ASA Firewall Hardening

Jul 25, 2018

Introduction I have conducted numerous firewall review for various types of organisations over the years. A common theme observed during these reviews is that most organisations do not have a firewall hardening procedure and/or do not conduct a regular firewall review which covers user accounts, exposed administrative interfaces, patch management and review of firewall rules. This article provides a guide or references other articles for hardening Cisco ASA firewalls and addressing the most common vulnerabilities observed during these firewall reviews. Continue reading

By Luca

Introduction To Red Teaming

Jun 26, 2018

When a company is in the process of proactively improving security posture, there are various services and standards that comes into help. Continue reading

Pages