Kieran Jessup - Cyber Security Architect

pretengineer

home whoami blog projects tools
Home / Blog / network-security

Posts tagged: network-security

2 posts

January 21, 2026
reconnaissance snmp enumeration

Recon: SNMP Enumeration Leading to Credential Disclosure

SNMP reconnaissance technique walkthrough: How poor SNMP configuration leads to credential disclosure and system compromise. Learn enumeration methods, MIB walking, and defensive hardening strategies for network management protocols.

Read More →
October 29, 2025
ism blue implementation

ISM-0534 Implementation Guide: Disabling Unused Physical Ports

ISM-0534 implementation guide: Disable unused physical ports on network devices. Complete configuration guidance for switches, routers, and network infrastructure. Step-by-step instructions for blue team security implementation and compliance.

Read More →