Posts

Showing posts from January, 2018

What is ARP Poisoning ?

Image
ARP (Address Resolution Protocol) Address Resolution Protocol (ARP) is a stateless protocol used for resolving IP addresses to machine MAC addresses. All network devices that need to communicate on the network broadcast ARP queries in the system to find out other machines’ MAC addresses. ARP Poisoning is also known as  ARP Spoofing. What is ARP Poisoning? ARP Poisoning is an attack where the attacker forcefully sends ARP Packets to the Victim's machine. How it Works? ARP spoofing constructs a large number of forged ARP request and reply packets to overload the switch. The switch is set in  forwarding mode  and after the  ARP table  is flooded with spoofed ARP responses, the attackers can sniff all network packets. Attackers flood a target computer ARP cache with forged entries, which is also known as  poisoning . ARP poisoning uses Man-in-the-Middle access to poison the network ARP Spoofing Attacks The effects of ARP spoofing at...

How Site to Site VPN works ?

Image
What is Site to Site VPN ?  A VPN connection that allows you to connect two Local Area Network called Site to Site VPN.  A VPN connection provides secure access to information between two or more sites   There are two types of Site to Site VPN available 1.Intranet-based 2.Extranet-based Intranet-based If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN. Extranet-based When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate  intranets .

WPA3 security is coming for Wireless devices

Image
The Wi-Fi Alliance has announced that WPA3 Security for Wireless devices going to be release this year.This wireless security will replace WPA2 security standards.It will protect Laptop,Phones and Computers. One of the key improvements in WPA3 will aim to solve a common security problem: open Wi-Fi networks. Seen in coffee shops and airports, open Wi-Fi networks are convenient but unencrypted, allowing anyone on the same network to intercept data sent from other devices. WPA3 employs individualized data encryption, which scramble the connection between each device on the network and the router, ensuring secrets are kept safe and sites that you visit haven't been manipulated.

MAC Spoofing Attack

Image
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user’s choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer’s identity, for any reason, and it is relatively easy. MAC spoofing attacks involve the use of a known MAC address of another host to attempt to make the target switch forward frames destined for the remote host to the network attacker. By sending a single frame with the source Ethernet address of the other host, the network attacker overwrites the MAC Table entry so that the switch forwards packets destined for the host to the network attacker. Until the host sends traffic, it will not receive any traffic. When the...