DHCP is like Costco and Walt Disney. Almost everyone has heard of it! We all know that DHCP is the magic that dishes out IP addresses to our computers. And we know that DHCP just works. But how does it really work?
I’m all about the why. When I was kid I bet I importuned my parents by inundating them with “Why’s”.
If you’ve been following my blog you know IP addresses is the minutiae of network communication. In fact, IP is nothing without TCP baby! Let’s enter the secret world of TCP and its super exclusive handshake. Read more ›
Would it be nice if you could console into a virtual ASA 5520 running ASA 8.4.2? You could setup NAT, site-to-site VPNs with virtual hosts and go crazy with firewall rules. The answer is yes, you can and I’m about to show you how I did it on my Mac OS X 10.10 host using GNS3.
Let’s say you and I went out to the local bar down the road and threw back a few beers. We would get to know each other. You would ask me what I do for a living, how’s the blog and if I had any brothers or sisters. And I would ask you about your hobbies, whether you have a family and your role at your current company.
And let’s say during our little interaction I discover that you’re the Senior Network Engineer at a large financial firm in New York City. You begin telling me how much you love your job, the benefits and salary. And then I ask you the million dollar question…
In the previous guide on spying on captured packets, I showed you to eavesdrop on the photos and movies people are downloading on the network. In this guide we’re going to step it up a notch and only see the password a user entered but also decrypted an encrypted traffic stream.
Always make sure you have the authority to launch the attacks I’m going to show you. It’s not worth getting fired or embarrassed; ask before you hack.