Questions tagged [ethernet]

39 questions
2
votes
1 answer

What is "Client Isolation" called on wired networks?

Wireless AP's commonly support a "Client Isolation" option to prevent wireless clients from communicating with each other. Is this feature commonly supported on wired ethernet switches to prevent wired clients from seeing or communicating with each…
Johnny
  • 1,418
  • 13
  • 18
2
votes
1 answer

Can someone find wpa2 key through ethernet?

When you connect to a ap using ethernet it requires no authentication but the traffic must be encrypted with a handshake shouldn't it? So wouldn't an attacker be able to write a script when he plugs a raspberry pi for instance into a ap he would be…
Aidan
  • 21
  • 1
1
vote
1 answer

How to ensure security between devices from different manufacturers over multicast

I'm involved in the design of a protocol that allows different manufacturers to share data amongst their products. The protocol uses multicast over Ethernet so any device can join. Note that it's very likely there won't be an internet connection on…
parsley72
  • 195
  • 7
1
vote
2 answers

How do I find a target on the wired network, from an attack system on Wi-Fi?

I'm trying to practice penetration testing on my home network. The target system is my desktop computer, which is connected to the network via ethernet cable. The attack system is my laptop, which is connected via Wi-Fi. My laptop is running Ubuntu…
1
vote
1 answer

Would it be possible to create an external mac address spoofer?

I was wondering if it would be possible to create some sort of ethernet passthrough device, but this device also functions as a layer 2 mac address spoofer, which can be used with any device without the need for a software mac address spoofer, or…
Alexm
  • 11
  • 1
1
vote
1 answer

Suricata and rules based on MAC address

I'm working on a project to implement SDN in a network. One of my flows is redirecting to the Suricata IDS and the flow works in layer 2 with MAC address. Since I've read that Snort only works in layer 3, I would like to know if it's possible to…
loi219
  • 113
  • 5
1
vote
0 answers

Video card - pci express security

I recently bought a second hand Nvidia video card which runs in SLI mode with my default video card. Can it be infected with a malicious program added by the previous owner, steal data from the system (as PCIe has DMA) and send it through…
fstfn
  • 11
  • 1
1
vote
1 answer

cross-over cable vs router for network with 2 computers?

I want to connect 2 Windows home computers together for a server/client relationship; however, only the "client" computer should be connected to the internet. "Server Computer" <----> "Client Computer" <----> INTERNET I'm looking at the pros and…
Todd
  • 11
  • 1
1
vote
0 answers

Establishing a physically enforced unidirectional Ethernet link with 1000BASE-X, fiber optic PHY

I have a use case where I am attempting to establish a unidirectional Ethernet link where a singular fiber is used to transmit data to the receiver. The Rx of the transmit side and the Tx of the receive side are not physically connected. The…
Quiet
  • 11
  • 2
1
vote
1 answer

Is plugging my computer directly into a college network a security risk?

I've been living in a dorm for the last week. When I arrived I basically set up my laptop and plugged in the ethernet cable directly into the socket in the wall (without a router in between). During the last days I've noticed that the internet is…
user123039
  • 31
  • 1
0
votes
2 answers

MACSEC nonce/key uniqueness

802.1ae requires a nonce to be sent with each Ethernet frame in the MACSEC tag. The 96 bit nonce is formed by concatenating a 64 bit fixed field (based on MAC source address and port number) with a 32 bit packet number. The packet number is…
0
votes
0 answers

What are possible attacks if am connecting to public WiFi using repeater, through Ethernet or /and if the router's firmware is hacked

What are possible attacks if am connecting to public WiFi using repeater, through Ethernet or /and if the router's firmware is hacked, supposing am running a Debian system ,blocking inbound connections and using a reliable VPN. One of the attacks is…
Bob
  • 35
  • 4
0
votes
1 answer

Ethernet wiretapping attack

I have some questions about the Ethernet wiretapping attack. I have already created a small lab using a cat5e (downgraded to 100mbit), a cat7 and this as a keystone: link. The lab looks like this: client --.TAPHERE.--> switch ---> modem So far I…
hyogy
  • 3
  • 4
0
votes
2 answers

Can devices in a WAN view/connect to devices in a LAN?

I live in an apartment building that provides cable internet via an ethernet cable that reaches my place. I connect this cable to my WAN port and distribute it internally via wifi through my password-protected router. Can computers on this WAN, in a…
sigmaxf
  • 623
  • 7
  • 17
0
votes
1 answer

Intel Ethernet Driver Advanced Settings for Security/Privacy

There are some settings found on Device Manager > Ethernet Driver > Advanced Tab. Are there suggestions for any of these settings? or any suggestion to improve ethernet driver security? Adaptive Inter-Frame Spacing Enable PME Energy Efficient…
Quvok
  • 1
  • 2