Detecting Port Forwarding: Can A Know It’s Communicating with C?
Detecting Port Forwarding: Can A Know It's Communicating with C?No, it's not possible for machine A to know if machine B is forwarding packets to machine C.Once the packets reach…
Detecting Port Forwarding: Can A Know It's Communicating with C?No, it's not possible for machine A to know if machine B is forwarding packets to machine C.Once the packets reach…
Understanding ARP Spoofing Attack As you're using PPPoE, most likely you don't actually connect to the same L2 Ethernet as other customers. The switch is configured to isolate customer Ethernet…
Understanding the TCP Window Size in hping3 In hping3, the "win=x" refers to the TCP Window Size. This value represents the number of window size units that the sender is…
Does a TLS client need to support all named groups supported by the server?For elliptical curve (EC) protocol, all that is needed is for the client and the server to…
Is Router Pinging Local Hosts Normal? It can be normal to see pings from a router. If you are using DHCP with conflict detection enabled it will verify if an…
Understanding Different IP Addresses Assigned when Using the Same Router For some time I have observed a strange behaviour when connecting to the internet through my WLAN. Depending on the…
Setting up a VirtualBox Pen Test LabThere's a few problems with your configuration as it stands, and some other concerns which should be addressed regarding setting up a pentesting lab…
Is CCNA Knowledge Valuable for Penetration Testers? In this article, I discuss whether obtaining CCNA certification would significantly enhance the knowledge of a penetration tester. While CCNA covers Cisco-specific topics,…