Questions tagged [routing]

Routing is the process of moving packets across a network from one host to another. It is usually performed by dedicated devices called routers.

Routing is the process of moving packets across a network from one host to another. It is usually performed by dedicated devices called routers.

146 questions
39
votes
3 answers

How can a webpage get the MAC address?

I was logged on to my router and filling out some information. I clicked a button and a field was automatically filled in with my computer's MAC address. How is this possible? Does it present a security risk? I'm connected through VPN and my…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
38
votes
2 answers

What are the security implications of enabling UPnP in my home router?

I found port forwarding entries in home router that I haven't manually configured. Is that because of UPnP? Are applications simply able to tell the router to forward ports on their own? Are there any security implications with enabling UPnP?
Kvass
  • 507
  • 1
  • 4
  • 5
28
votes
3 answers

How does "traceroute over TCP" work, what are the risks, and how can it be mitigated?

There is a utility called tcptraceroute, and this enhancement called intrace that is used just like a standard traceroute, but it works over TCP. How is the syn flag in TCP used to achieve traceroute like functionality (when ICMP is off) What…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
27
votes
5 answers

Access to a router's GUI

During a recent visit to a coffee shop, I noticed that they hadn't bothered changing their default user name and password for their router. I realise that someone could log on and be annoying to other users (kicking people off the network, locking…
csgillespie
  • 957
  • 1
  • 9
  • 15
26
votes
12 answers

Public DMZ network architecture

Years ago, when I was a student, a network security professor taught me in a class what a DMZ is. The architecture he used in his slides was similar to this one: Now that I got employed, my boss, a security engineer with 10+ years of experience has…
lisa17
  • 1,958
  • 7
  • 21
  • 43
25
votes
5 answers

How secure is binding to localhost in order to prevent remote connections?

Let's say we're running a service that's bound to localhost (127.0.0.1), and the goal is to only allow local clients (i.e. from the same machine only) What techniques might be used to break this security, are there additional measures that could be…
davidkomer
  • 521
  • 4
  • 9
25
votes
3 answers

What does the email header-line "message opened by mailclient" mean?

Today a Belgian MP claimed (backed up by a security expert) that her email headers show that her email was read during routing (text in Dutch). The published screenshot of the headers highlights the final line in the extended headers: message…
mhermans
  • 541
  • 4
  • 11
23
votes
4 answers

Router password vs MAC filtering?

I just bought a Galaxy S4, and it didn't connect to the WIFI in my house (I have a 14$ router). After a bit of testing, I've decided to leave my connection open without a password, but added the devices manually to the whitelisted MAC addresses.…
jcho360
  • 813
  • 2
  • 8
  • 12
20
votes
4 answers

Can home routers get infected?

I am behind a router(linksys that runs dd wrt on it) and I was infected with sality. I'm curious, can my router get infected too? If yes, how can I remove the infection? I used the search bar but found nothing relevant.
Skaziana
  • 201
  • 1
  • 2
  • 3
16
votes
5 answers

Multiple VPN clients in parallel

If I were to run more than one VPN clients on my machine, simultaneously, what risks would be involved? E.g. are there technical conflicts, such that it wouldn't work right? Could there be address resolution conflicts? More scary, can traffic…
AviD
  • 72,138
  • 22
  • 136
  • 218
14
votes
1 answer

Attackers of Google DNS hijacking

As we know Google DNS server (8.8.8.8) in 14th and 15th March was hijacked in Sao Paulo. And subsequent to this event, BGPmon.org announced an alert. Now, In a course assignment, we are asked to find AS number of the attacker. I for this question…
frogatto
  • 265
  • 1
  • 11
12
votes
3 answers

How to best set up public WiFi without giving access to the rest of my network?

For reference, this is just for my home network. Anyway, I have quite a few of my neighbors ask me to share my internet with them. I'd really like to eliminate this "here's the password" portion though by just making my network publicly accessible.…
Earlz
  • 604
  • 2
  • 6
  • 15
12
votes
1 answer

Firewall defined Akamai IP Range

With obvious dangers of opening up a wide range of ips, does anyone know how I can get a source of IP ranges for Akamai? When talking to Akamai they say 'not possible' which I find surprising. I need a range of IPs that would be served in the…
Jakub
  • 239
  • 1
  • 2
  • 7
12
votes
3 answers

Is NAT Loopback on my router a security problem?

Some DSL routers prevent NAT loopback. Security is sometimes cited as the reason. Is NAT loopback really a security issue? And if so, how is this exploited? NAT loopback... where a machine on the LAN is able to access another machine on the LAN via…
MrWhite
  • 294
  • 1
  • 2
  • 15
11
votes
5 answers

How can a company reduce exposure to packet spoofing? What solution should exist, but doesn't?

I'd like to understand what anti-packet-spoofing technology exists (or should exist) to verify an inbound packet. Maybe this is as simple as a Cisco ACL, Firewall Rule, implemented at the network boundary; however I think the issue might be a…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
2 3
9 10