Questions tagged [network]

Security of network infrastructure and network traffic. For questions about security of network equipment, topology, protocols, traffic, administration, and configuration. Related tags: [packet], [firewall], [network-scanners], [network-access-control].

The provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

This tag applies to any aspect of network security, from hardware and equipment up to software and configuration.

In the future we may want to re-tag some questions if we create tags for , , etc.

2793 questions
2
votes
2 answers

Locate server by latency it has to other servers

I just thought about how one can locate a server he has administrative privileges on. My "best" idea till now is to ping a huge amount of servers and then measure the latency of the host to these servers and then calculate the hosts location like…
davidb
  • 4,285
  • 3
  • 19
  • 31
2
votes
3 answers

Detect trojan/keylogger/virus on a businees network

On a business computer network with around 50 computers, there is a computer infected. We need to find that and remove it. I have been running the software below in the suspicious computers, but didn't find…
2
votes
0 answers

Determining time it would take to exhaust IVs on 802.11b/g/n

I'm trying to learn about WEP attacks at the moment. I know that attacks against WEP require collisions of the initialization vectors. Is there a way to determine how long it would take for the vectors to be exhausted on 802.11b/g/n networks before…
pfinferno
  • 121
  • 2
2
votes
3 answers

Linux File Security when connected to internet

Let me first admit that I am a nobody in computer security - I just know the various threats generally known to public. I have a Linux Cent OS 7 installed on my computer which is connected to the Internet always - on my personal home network. I…
kausDix75
  • 23
  • 2
2
votes
1 answer

Hiding packets, requests, traffic from my PC through Ethernet connected to workplace network

Before everyone jumps on the bandwagon, as I so often see, of saying you shouldn't do anything on a workplace network that is to be done annonymously on your own home network, I want to know an actual answer... Can my traffic be encrypted before it…
Kravitz
  • 123
  • 3
2
votes
1 answer

Why hashing algorithms in layer 2 are weak?

It's known that hashing algorithms such as md5 and SHA1 are weak and can easily be cracked. I wonder why many layer 2 and 3 devices such as cisco switches still use weak hashing algorithms but don't support strong ones ?( e.g Enable password could…
aboujanane
  • 49
  • 5
2
votes
1 answer

Types of risks for my router

Recently I've read about viruses and worms that attack routers and do some nasty things, incl. DNS changes etc. In the beginning, I just read that some people have issues that their DNS server address being substituted for something fake and evil.…
user90723
  • 21
  • 1
2
votes
0 answers

Wayland Partial Encryption for Mouse / Keyboard? (Also X and RDP)

Question What are the best practices for implementing Partial Encryption, to encrypt just the input devices (mouse/keyboard, etc), not the actual video display, during remote desktop sessions using X, RDP, or (more importantly in our environment)…
elika kohen
  • 292
  • 1
  • 9
2
votes
1 answer

What is the difference between X-Received and Received in email-header?

Also how to calculate delay between sent and received?
sholes
  • 33
  • 1
  • 1
  • 3
2
votes
3 answers

Gathering network device data for security detection purposes

I've finally gotten the networking team to start sharing data on the devices they manage (routers, firewalls, VPN, NAC, etc), so we can get better insight into our network and focus more on detection. In a best effort to not create a fire-hose of…
estudiante
  • 21
  • 3
2
votes
1 answer

Is it possible to disable `ypcat passwd`

We have an old NIS setup which, at geological speed, is being replaced by a Kerberos one. In the meantime, all the (non-root) users can simply type ypcat passwd and get the hashes of all the users' passwords. Is there an interim hack one can do to…
graffe
  • 587
  • 1
  • 4
  • 8
1
vote
1 answer

Client access to domain controller

I'm working on a solution to identify if a machine is a member of the domain or not. We are using Checkpoint R75 Identity Awareness with two possible methods to retrieve machine identity. AD Query to pull out machine authentication from…
Dog eat cat world
  • 5,759
  • 1
  • 27
  • 46
1
vote
1 answer

Strange IP's on my firewall log

Check the screenshot of my router firewall log below, I can see traffic originating from strange IP addresses to my public address. What are these? I've just setup this router few hours ago, am I being hacked or part of DoS attack?
1
vote
2 answers

Device visibility on a network

At my college dorm's Wi-Fi network, one device can play to any other network-connected, YouTube-enabled device on that network. Apple devices can also AirPlay to the one Apple TV connected here. How would the IT Staff here make the visibility from…
DDPWNAGE
  • 195
  • 7
1
vote
1 answer

Network setup for malware analysis lab in a corporate view

I am planning to setup a malware analysis lab in the Incident Response team of the company I work for. As I am basically a malware analyst I some how managed to get up with the malware analysis lab setup. Now I want to your help in setting up…
saravanan
  • 11
  • 2