Questions tagged [network]

Security of network infrastructure and network traffic. For questions about security of network equipment, topology, protocols, traffic, administration, and configuration. Related tags: [packet], [firewall], [network-scanners], [network-access-control].

The provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

This tag applies to any aspect of network security, from hardware and equipment up to software and configuration.

In the future we may want to re-tag some questions if we create tags for , , etc.

2793 questions
1
vote
2 answers

TCP- or UDP-based Port Scans, IP Fragmented Packet

Is this normal or is someone trying to hack/attack me? How can I stop this? My router is a Cg3000v2 netgear provided to me by Optus. [TCP- or UDP-based Port Scan]411 Wed Aug 26 00:28:08 2015 27.253.92.28:59553 199.85.126.20:53 [IP Fragmented…
jay
  • 11
  • 1
  • 2
1
vote
1 answer

Is there a vulnerability when TLS is decrypted, then encrypted with OpenSSL that is vulnerable to BEAST or CRIME?

Assume that the following TLS proxy exists User <-----> Load Balancer that decrypts, encrypts <------> WebServer Where the web server is running a vulnerable version of OpenSSL. Can the user exploit the web server if it is vulnerable to TLS or…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
vote
4 answers

How to send HTTPrequest anonymously

I want to send a HTTPrequest to a specific web address, but with different IP address. For example, if a webserver detect IP address, then add it to a database. If another request come from a IP, which is in the DB server, ignore it. What I'm asking…
while true
  • 167
  • 1
  • 1
  • 7
1
vote
1 answer

Security testing on network

A group of student have been asked to do a bit of network security testing at college. Basically the college have just invested in some android tablets, more macs and more net books. The IT admins wants to just double check everything before they…
Dr.Pepper
  • 241
  • 3
  • 7
1
vote
2 answers

Is this exploit on household appliances really as bad as it sounds?

CNN article link. The article claims that a household appliance can be hacked by reprogramming the circuits inside of it to release electromagnetic waves that could release system information, but exactly how credible is the threat, or is it as bad…
yuritsuki
  • 528
  • 1
  • 5
  • 10
1
vote
2 answers

Opened Ports on a Router attack vectors

I have read somewhere that it could be dangerous to use unknown networks because the router owner could open ports and attack programs that would run on the victim's system on precisely those ports. I asked in the named forum (the link is in german)…
1
vote
1 answer

How separated should a management VLAN be from the production VLAN?

I was after a little bit of advice regarding Network Management. Users will enter the network and hit a remote desktop server. On from this, they will pass through firewalls to the core switch. When they hit the core switch they are heading to a…
Adie
  • 13
  • 1
  • 4
1
vote
3 answers

Install my own proxy

My school network has blocked a lot of webpages, including TeamViewer, which I need. The IT department told me to find a proxy, because it was their ISP who had blocked the sites. To connect to the internet all the school computers are set up like…
Friend of Kim
  • 391
  • 2
  • 3
  • 12
1
vote
2 answers

Can I connect to a network without being detected?

Some people use software like whoisonmywifi and so on. Is there a way to bypass this software? I think it pings all IP addresses like 192.168.1.0/24 so it will ping all addresses. Can I disable the ability to be pinged? Can I bypass this software?…
m0nprogrammer
  • 29
  • 1
  • 4
1
vote
1 answer

Link(s) between subnet mask, IP address and subnet ID

I am studying CompTIA Security+ material and am struggling to understand the link(s) between a subnet mask, an IPv4 address and a subnet ID. The question that I'm working on is as follows: Your network uses the subnet mask 255.255.255.224. Which…
1
vote
0 answers

SDN Security - why not attack the controller itself?

I have been looking into SDN (Software Defined Networking) and one advantage of using this is to be able to redirect traffic to stop DDoS attacks. The traffic is ultimately thrown away. My question is if a network is using SDN couldn't an attacker…
bigC5012
  • 143
  • 7
1
vote
0 answers

Web/search engine spider on local network?

I was setting up a test webserver on my local network earlier, and whilst sorting out the firewall I noticed the following in the log (/var/log/ufw.log - I'm using UFW on Ubuntu 14.04): Jul 9 14:17:46 wilf-G560 kernel: [ 7098.779915] [UFW BLOCK]…
Wilf
  • 111
  • 4
1
vote
0 answers

Adding a binary to the firmware of a routing device

I've been playing around with a router d-link dwr-921 and found some vulnerabilities in the web interface. I still haven't managed to get shell access and now I'm thinking about modifying the firmware since I can access the administration panel. So…
Sebi
  • 1,391
  • 9
  • 16
1
vote
3 answers

Why is shared less secure than open when it comes to WEP?

According to this post, Jeffrey Tippet (Microsoft employee) writes: WEP can run in two modes: shared and open. Despite the names, shared is actually less secure than open. Because of this, our telemetry shows that that only 0.1% (and declining)…
1
vote
1 answer

Padding of 802.11 packet with 0's in libpcap

I am trying to send probe request to Access Points.But whenever I send a probe request packet it is padded with 0's i.e I see two packets on wireshark for every packet I send : a non-padded packet and a padded packet with 0's at the end.The padding…
faraz khan
  • 329
  • 2
  • 12