Questions tagged [network]

Security of network infrastructure and network traffic. For questions about security of network equipment, topology, protocols, traffic, administration, and configuration. Related tags: [packet], [firewall], [network-scanners], [network-access-control].

The provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

This tag applies to any aspect of network security, from hardware and equipment up to software and configuration.

In the future we may want to re-tag some questions if we create tags for , , etc.

2793 questions
1
vote
2 answers

Cheap and efficient strategy to protect against professional attack?

With things like NSA or state sponsored attack, it seems that no one is safe from a technical point of view. Is there any efficient method or strategy to protect against them? My guess is that relying on technologies is the worst method, as it is…
user2174870
  • 1,378
  • 2
  • 11
  • 13
1
vote
1 answer

Is it there any effective way to prevent shodan to access my webcams

Recently while browsing using shodan, I came across a search string to explore webcams. Some of the searches I carried out were: webcamxp city:city name webcamxp geo: longitude and latitude which exposed some public webcams. This raises two…
BlueBerry - Vignesh4303
  • 5,107
  • 13
  • 34
  • 63
1
vote
0 answers

Migration from TDM to All IP: any security issues?

My phone operator is slowly abandoning TDM (Time Division Multiplexing) to replace it with IP connections. What are the security risked related to this change? will all the phone line be like in a big LAN? will it be easier to do packet injections,…
user41417
  • 23
  • 2
1
vote
2 answers

Is it Safe to Send an Invalid Password Back to the Client?

It is common for websites to remember the username input value after an invalid login attempt but not the password input value. Take SE for instance. When I attempt to login with an invalid password: The response contains my username but not my…
1
vote
1 answer

What this type of attack called? (gaining peripheral information)

When the intruder looks at the transmitted data and finds information about the sender and the receiver of the data or other peripheral information that won't help him hack the system but know more about the transmitted data type/nature/ sender and…
Creatoza
  • 25
  • 1
  • 3
1
vote
1 answer

Snort - Rule: Alert all php requests

I am trying to understand writing rules for snort. Further goal is detection of sql injections like here. I've read the documentation of snort rules and created this rule: alert tcp any any -> any 80 (msg:"SQL Injection - Paranoid"; content:".php";…
Jan
  • 111
  • 3
1
vote
1 answer

How to simulate network attacks and use wireshark to detect them?

I am working on a project which involves me to simulate a network attack and to use wireshark to detect the attack. DOS/MIM etc. I have found the following links that provided help but there are still some ambiguities in attack generation. Can…
Goldriver
  • 19
  • 1
  • 1
  • 4
1
vote
2 answers

Hashcat does 1-7 numeric characters on brute force attack when specifying 8

I have Hashcat 0.49 on Kali Linux 1.1.0a and I have a .hccap file. It's a WPA2 Network in the file so I chose a mask of 8 numeric characters (?d?d?d?d?d?d?d?d) and instead of starting at 8 numeric characters it does 1-7 first which takes a long…
kprovost7314
  • 111
  • 1
  • 2
  • 8
1
vote
3 answers

Can a network admin see my computer's screen if I'm logged into their wifi network?

I had a friend try to convince me today that simply by signing into a wifi network, without any physical access to your computer, the network admin can see your computer's screen. Obviously this is false, but I don't enough about networking to…
Jon
  • 386
  • 1
  • 3
  • 13
1
vote
2 answers

Identifying the correct SSID

Suppose a Wi-Fi network is present with a given SSID. Now I create a hotspot with the same SSID as that of the original network. If a user tries to connect to the Wi-Fi, which one will he connect to? Also suppose the original Wi-Fi asked for a…
faraz khan
  • 329
  • 2
  • 12
1
vote
1 answer

Host-based security architecture for web server network

I am begining with network security and after studying for a while about often used technologies I got to this architecture for my home server (sorry it is not in english). I considered 3 basic general security principles for this 2: Defense…
Marcos Valle
  • 162
  • 1
  • 4
  • 12
1
vote
0 answers

Should I use a VM firewall or not?

I am managing a couple of VPS-es on an old platform I would like to no longer maintain. We used a widely used commercial VPS control panel to create the VPS-es in question. The customers may access their VPS-es with root access. We got a high…
Martin
  • 21
  • 3
1
vote
2 answers

NMap to scan a private subnetwork

I have a test network setup based on virtual machines. My host machine, a web server and the firewall is under the 192.168.0.0/24 network (gateway is 192.168.0.1); a server machine is located behind the firewall on the 10.40.1.0/24 network (firewall…
Aion
  • 111
  • 2
1
vote
3 answers

Most secure location of database

Let's say I have a straight forward completely database driven web site application and I store my database on my web server in the DMZ. I won't be broadcasting the IP address of my database because I won't be sending calls to it, which makes my…
1
vote
1 answer

Security issues with multiple interfaces

Say I have a server with multiple interfaces. I wish to configure each interface as different IP addresses (and host name). Is it advisable, on a security standpoint, to do that? I have an application sitting on this server collecting statistics…
Pang Ser Lark
  • 1,929
  • 2
  • 16
  • 26