• An error has occurred, which probably means the feed is down. Try again later.

Digging tunnels with SSH

SSH tunnels are an old trick, which is recently getting increasingly popular with all this content filtering happening at the corporate or even at the national level. This article demonstrates how to use SSH tunnels, bypass content filters and avoid port restrictions, even through HTTP proxy servers. . . . → Read More: Digging tunnels with SSH

ARP spoofing attack and defense

As described in Wikipedia, ARP spoofing (otherwise known as ARP poisoning or Arp Poison Routing – APR) is a Layer 2 attack that can be carried out in most internal networks and therefore is extremely dangerous. It’s main purpose is to sniff the communication of a client talking to a server, by intercepting or even modifying the traffic in order to decrypt the already encrypted traffic. This article will guide you through the process of understanding, demonstrating and protecting your network against this attack. . . . → Read More: ARP spoofing attack and defense

Protect your Apache web server with mod_evasive

Mod_evasive is an Apache module that is designed to limit the impact of different types of attacks (like DDoS, scripted or brute force) on your web site/server. When integrated with iptables, mod_evasive can stand up to even larger attacks. . . . → Read More: Protect your Apache web server with mod_evasive

DHCP starvation - quick and dirty

The DHCP starvation attack is quite simple to implement and therefore quite dangerous, especially if it grows to a DHCP spoofing attack. It can be used to implement a Denial of Service (DoS) attack against the DHCP server on the local network, thus preventing legitimate clients from accessing network resources. In this article we will demonstrate how this attack can be deployed and later we will go through the steps necessary to mitigate it on Cisco equipment with the help of DHCP snooping. . . . → Read More: DHCP starvation – quick and dirty