Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. A quick reminder that you really need to have your fortinet firewalls behind a firewall

A quick reminder that you really need to have your fortinet firewalls behind a firewall

Scheduled Pinned Locked Moved Uncategorized
16 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jerry@infosec.exchangeJ jerry@infosec.exchange

    A quick reminder that you really need to have your fortinet firewalls behind a firewall

    Link Preview Image
    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

    favicon

    The Hacker News (thehackernews.com)

    johnley@infosec.exchangeJ This user is from outside of this forum
    johnley@infosec.exchangeJ This user is from outside of this forum
    johnley@infosec.exchange
    wrote last edited by
    #3

    @jerry meanwhile I’m at fortinet accelerate this week…

    johnley@infosec.exchangeJ 1 Reply Last reply
    0
    • jerry@infosec.exchangeJ jerry@infosec.exchange

      A quick reminder that you really need to have your fortinet firewalls behind a firewall

      Link Preview Image
      FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

      Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

      favicon

      The Hacker News (thehackernews.com)

      ichinin@infosec.exchangeI This user is from outside of this forum
      ichinin@infosec.exchangeI This user is from outside of this forum
      ichinin@infosec.exchange
      wrote last edited by
      #4

      @jerry Apparently Fortinet is built upon Linux so...apt-get install iptables ?

      1 Reply Last reply
      0
      • jerry@infosec.exchangeJ jerry@infosec.exchange

        A quick reminder that you really need to have your fortinet firewalls behind a firewall

        Link Preview Image
        FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

        Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

        favicon

        The Hacker News (thehackernews.com)

        samantazfox@infosec.exchangeS This user is from outside of this forum
        samantazfox@infosec.exchangeS This user is from outside of this forum
        samantazfox@infosec.exchange
        wrote last edited by
        #5

        @jerry Maybe we should ask them to reconsider the industry they're working in. At this point, they should open a swiss cheese factory, they'd do great!

        baloouriza@social.tulsa.ok.usB 1 Reply Last reply
        0
        • johnley@infosec.exchangeJ johnley@infosec.exchange

          @jerry meanwhile I’m at fortinet accelerate this week…

          johnley@infosec.exchangeJ This user is from outside of this forum
          johnley@infosec.exchangeJ This user is from outside of this forum
          johnley@infosec.exchange
          wrote last edited by
          #6

          @jerry following up on the “firewall in front of your fortigate” that’s called local in policies and the authorized hosts list.

          But dogshit fly by night MSPs have never heard of that or VPNs, so they just open up the management interface(s) to the internet, slap a “all to internet” firewall policy in there with no inspection and sell it to an unsuspecting accounting firm for hundreds of dollars a month, then call themselves an MSSP.

          pauliehedron@infosec.exchangeP 1 Reply Last reply
          0
          • viss@mastodon.socialV viss@mastodon.social

            @jerry spectacular. no notes

            johntimaeus@infosec.exchangeJ This user is from outside of this forum
            johntimaeus@infosec.exchangeJ This user is from outside of this forum
            johntimaeus@infosec.exchange
            wrote last edited by
            #7

            @Viss @jerry

            I've been going to lots of .mil tech conferences lately. There's always a fortinet booth and an ivanti booth. I don't think I've seen anyone actually go to those booths.

            1 Reply Last reply
            0
            • johnley@infosec.exchangeJ johnley@infosec.exchange

              @jerry following up on the “firewall in front of your fortigate” that’s called local in policies and the authorized hosts list.

              But dogshit fly by night MSPs have never heard of that or VPNs, so they just open up the management interface(s) to the internet, slap a “all to internet” firewall policy in there with no inspection and sell it to an unsuspecting accounting firm for hundreds of dollars a month, then call themselves an MSSP.

              pauliehedron@infosec.exchangeP This user is from outside of this forum
              pauliehedron@infosec.exchangeP This user is from outside of this forum
              pauliehedron@infosec.exchange
              wrote last edited by
              #8

              @johnley @jerry It's literally a check box where you put the MGT listener on an interface. It can like not be checked on internet facing ones. Mine at home doesn't have it so I know it's not hard. lol.

              1 Reply Last reply
              0
              • jerry@infosec.exchangeJ jerry@infosec.exchange

                A quick reminder that you really need to have your fortinet firewalls behind a firewall

                Link Preview Image
                FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                favicon

                The Hacker News (thehackernews.com)

                glitchy404@wetdry.worldG This user is from outside of this forum
                glitchy404@wetdry.worldG This user is from outside of this forum
                glitchy404@wetdry.world
                wrote last edited by
                #9

                @jerry https://tvtropes.org/pmwiki/pmwiki.php/Main/WhoWatchesTheWatchmen

                1 Reply Last reply
                0
                • jerry@infosec.exchangeJ jerry@infosec.exchange

                  A quick reminder that you really need to have your fortinet firewalls behind a firewall

                  Link Preview Image
                  FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                  Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                  favicon

                  The Hacker News (thehackernews.com)

                  csolisr@hub.azkware.netC This user is from outside of this forum
                  csolisr@hub.azkware.netC This user is from outside of this forum
                  csolisr@hub.azkware.net
                  wrote last edited by
                  #10
                  Ah yes, good ol' FortiVulnsPerWeek
                  csolisr@hub.azkware.netC 1 Reply Last reply
                  0
                  • csolisr@hub.azkware.netC csolisr@hub.azkware.net
                    Ah yes, good ol' FortiVulnsPerWeek
                    csolisr@hub.azkware.netC This user is from outside of this forum
                    csolisr@hub.azkware.netC This user is from outside of this forum
                    csolisr@hub.azkware.net
                    wrote last edited by
                    #11
                    Or as the Slavic sphere would call them, Forti-НЕТ
                    1 Reply Last reply
                    0
                    • jerry@infosec.exchangeJ jerry@infosec.exchange

                      A quick reminder that you really need to have your fortinet firewalls behind a firewall

                      Link Preview Image
                      FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                      Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                      favicon

                      The Hacker News (thehackernews.com)

                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchange
                      wrote last edited by
                      #12

                      @jerry

                      fortinet firewalls remind me of my grandmother.

                      she had slip covers to protect her upholstery, then vinyl covers to protect her slip covers...

                      she also had cork to protect the wood on her dining room table, custom covers to protect the cork, a table cloth over the covers, plastic to protect the table cloth.

                      i just get polyurethane finish on the wood table and call it done.

                      1 Reply Last reply
                      0
                      • jerry@infosec.exchangeJ jerry@infosec.exchange

                        A quick reminder that you really need to have your fortinet firewalls behind a firewall

                        Link Preview Image
                        FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                        Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                        favicon

                        The Hacker News (thehackernews.com)

                        R This user is from outside of this forum
                        R This user is from outside of this forum
                        rafalbla@infosec.exchange
                        wrote last edited by
                        #13

                        @jerry Isn't it like that with Chrome 0-days every other week?

                        1 Reply Last reply
                        0
                        • jerry@infosec.exchangeJ jerry@infosec.exchange

                          A quick reminder that you really need to have your fortinet firewalls behind a firewall

                          Link Preview Image
                          FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                          Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                          favicon

                          The Hacker News (thehackernews.com)

                          huronbikes@cyberplace.socialH This user is from outside of this forum
                          huronbikes@cyberplace.socialH This user is from outside of this forum
                          huronbikes@cyberplace.social
                          wrote last edited by
                          #14

                          @jerry genuinely considered purchasing a used gateway appliance just to get a picture of it plugged into itself, but people still want significant sums of money for them.

                          tim_lavoie@cosocial.caT 1 Reply Last reply
                          0
                          • samantazfox@infosec.exchangeS samantazfox@infosec.exchange

                            @jerry Maybe we should ask them to reconsider the industry they're working in. At this point, they should open a swiss cheese factory, they'd do great!

                            baloouriza@social.tulsa.ok.usB This user is from outside of this forum
                            baloouriza@social.tulsa.ok.usB This user is from outside of this forum
                            baloouriza@social.tulsa.ok.us
                            wrote last edited by
                            #15

                            @SamantazFox Clownflare suddenly considers buying cows...

                            @jerry

                            1 Reply Last reply
                            0
                            • huronbikes@cyberplace.socialH huronbikes@cyberplace.social

                              @jerry genuinely considered purchasing a used gateway appliance just to get a picture of it plugged into itself, but people still want significant sums of money for them.

                              tim_lavoie@cosocial.caT This user is from outside of this forum
                              tim_lavoie@cosocial.caT This user is from outside of this forum
                              tim_lavoie@cosocial.ca
                              wrote last edited by
                              #16

                              @huronbikes @jerry Would a Fortigate 100D suffice? Mine (got as a free toy with a year's support) has been idle for a few years now.
                              Other than shipping, it's free.

                              1 Reply Last reply
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups