Questions tagged [network]

Security of network infrastructure and network traffic. For questions about security of network equipment, topology, protocols, traffic, administration, and configuration. Related tags: [packet], [firewall], [network-scanners], [network-access-control].

The provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

This tag applies to any aspect of network security, from hardware and equipment up to software and configuration.

In the future we may want to re-tag some questions if we create tags for , , etc.

2793 questions
1
vote
0 answers

Information Security classification

I've been interested in IT security for a bit (~1 year) and had a bit of experience with NSM as well as web security. I want to have an overview of the entire industry, with all relevant niches and the association between them. The reasons for this…
1
vote
0 answers

Snort alerts analysis (web interface)

I have a question about Snort (or maybe any other IDS/IPS, any working solutions would be ok). The goal is to set up some web interface providing a way to view the whole TCP stream packets of each Snort alert. I'm interested in outgoing packets…
1
vote
1 answer

Does NDP (Neighbor Discovery Protocol) reduce ARP (Address Resolution Protocol) attacks?

I read the comparison of NDP with ARP but am uncertain if NDP does reduce any amounts of ARP attacks, given that with NDP, ARP is not used for address resolution. For the discussion to be specific, let us leave out the extension of NDP, SEND…
George
  • 739
  • 1
  • 6
  • 22
1
vote
0 answers

ARP poisoning question

I'm writing a program that detects ARP poiosoning. My question is: How can I b sure my LAN hasn't been poisoned? Yes, I can use my settings and find the IP address of the default gateway and yes I can get the MAC Address of my gateway and compare…
magna_nz
  • 319
  • 1
  • 2
  • 5
1
vote
1 answer

Belkin wifi netcam cloud storage

If my net/router turns off with the belkin netcam will i still receive video if the motion sensor is activated? I was considering purchasing one, but if all that needs to be done is simply turning off the wireless router I really do not see the…
asa
  • 11
  • 1
1
vote
1 answer

Setting up a secure Ad-Hoc network

I am taking my laptop with me on a school bus trip, and I want to use an Ad-Hoc network to host a multiplayer Minecraft server. I have heard, however, that Ad-Hoc networks have a vulnerability that makes it possible for people to access your…
DaveTheMinion
  • 143
  • 1
  • 7
1
vote
2 answers

Is VPN the best solution against man-in-the-middle attack?

I'm looking for the best way to protect my enterprise against man in the middle attacks, because a lot of people connect to the same network. So I was thinking of creating a VPN. Is this really the best solution against MitM attacks?
NathanWay
  • 559
  • 7
  • 14
1
vote
1 answer

Router detecting constant ack flood attacks and port scans

I first noticed this yesterday in my logs - while I was configuring the router settings, so I don't know how long it's been going on. What should I do? I reconfigured my router with more secure settings, changed my password and it's still happening.…
Calisto
  • 67
  • 2
  • 2
  • 7
1
vote
4 answers

Is it possible to bypass sniffing when using port mirroring?

INTERNET <-A-> ROUTER <-B-> PC Let's theoretically think we mirror the port on a ROUTER to a file. So the full network traffic on it. Question: is it possible to still have communications on that wire (between the PC and the INTERNET) that will…
1
vote
1 answer

What precautions I can take to secure software against user?

I want to build a client that connects to my server and uses server API. You can consider this as a banking application because data security is the most important thing. Since the users or hackers going to try breach software security to get into…
Batuhan
  • 672
  • 4
  • 17
1
vote
1 answer

How does the DNS-spoofer know the original destination of the packet?

It's perhaps my lack of deeper knowledge of how the DNS, NAT or TCP works, but I have been thinking about the following scenario and can't figure out the following problem which arises in DNS-spoofing MITM attack: Imagine a MITM attack, which is…
NumberFour
  • 195
  • 1
  • 8
1
vote
1 answer

How to retrieve the MAC address of a remote IP

I have an IP address, and I want to find the corresponding MAC address. The IP address is in the same city, so we're connecting to the same network. How do I find the corresponding MAC address?
Ali
  • 43
  • 2
1
vote
3 answers

Decrypting SSL over a mobile network

I work for a large company and we are trying to judge the safety of some proprietary information that is being sent and received in a new application we are developing. After our initial testing we realized that we could easily do a MitM attack with…
Nefariis
  • 111
  • 4
1
vote
0 answers

Two similar computeres on same network, different traceroutes (one slow - one fast)

My SO's computer has a very slow internet connection. So I compared her traceroute to xkcd.com with mine. We are on the same network, on both on os-x. It's a simple 4g home router. tracerouter --versionshows for both computers: Version…
Andreas
  • 111
  • 2
1
vote
3 answers

Am I exposing my application to IP address forgery / ip spoofing?

Here is my setup: I will create two REST services that are run on Server B and should only be called from Server A. Both servers are on the same network and I am not able to configure a firewall to enforce this. There are several clients that share…
Marged
  • 121
  • 2
1 2 3
99
100