Routing is the process of moving packets across a network from one host to a another. It is usually performed by dedicated devices called routers.

learn more… | top users | synonyms

4
votes
2answers
75 views

Encryption of headers in IPsec tunnel mode

I am learning about IPsec's transport and tunnel modes. I understand that transport mode encrypts only the payload of an IP packet and is used for communication between two entities that both ...
-1
votes
0answers
27 views

Routing using OPSF [closed]

assume that I have 4 buildings which all connected to main building and in each building I have privileged subnet ( red circles ). privileged subnet must be able to connect each other, and rest of the ...
2
votes
1answer
48 views

find hardware and OS specs on routers

How do you determine the model and IOS version of a Cisco router, if you have its IP address remotely, but have no physical access. For example, I run nmap -sP and can see the router's IP, but all ...
2
votes
2answers
84 views

Does “loose source and record route” drop the source address?

Is the source IPv4 address lost when a person uses "loose source and record route" and the destination address is put before the end of the list of addresses through which routing should occur? It ...
2
votes
2answers
133 views

do different subnet masks on home network provide any security?

So I have two routers on my home network: one is provided by my ISP, and the other is my private router. Router A- ISP router: 192.168.1.x router B- private router: 192.168.2.x Clients on my ...
0
votes
1answer
112 views

How to conduct a disguised LSA attack against OSPF?

I want to do disguised LSA attacks on OSPF network and be able to more analyze, so I do not know how it works in practice. This is a penetration test. The attack is described in the address [+]. I ...
1
vote
1answer
69 views

What is the fight-back mechanism in OSPF?

I want to know more about the fight-back security mechanism in OSPF routing protocol. When is the mechanism activated and how does it work? I found the source description of OSPF fight-back, but the ...
1
vote
1answer
142 views

Loki How to crack the password hash OSPF?

I have created for myself a lab of routers in GNS3 . Routing protocol between routers is OSPF. Now,by Loki penetration testing, I found that routers are the feature authentication. Using wireshark, I ...
5
votes
4answers
1k views

How is Tor secure?

If Tor is open source and thus its process of concealing your IP is known, then how does it keep anything secure? Couldn't someone look at the source code and figure out how to reverse the routing ...
2
votes
3answers
7k views

How to bypass restrictive mac address filtering on home network (not malicious)

Background A short sketch of my situation before I formulate my question: I am on a large home network, which is privately administered by a couple of admins. The network consists of a lan and a ...
1
vote
3answers
602 views

What devices support the permanent addition of an ARP table entry? What tools are available to manage this?

I would like to improve wireless security and certain other on-net security scenarios with a permanent ARP table entry. The idea being that someone on the same subnet or WiFi network will have a more ...
7
votes
3answers
5k views

How to best set up public WiFi without giving access to the rest of my network?

For reference, this is just for my home network. Anyway, I have quite a few of my neighbors ask me to share my internet with them. I'd really like to eliminate this "here's the password" portion ...
4
votes
4answers
984 views

Two SSIDs on same Access point- not good?

If I were to offer two networks (one for trusted users and one to visitors) on one physical access point, is this dangerous because a visitor could compromise the trusted network across via the ...
1
vote
2answers
190 views

Wireless LAN router fingerprinting

Does anyone know of a database that lists the range of MAC addresses that are assigned to each particular brand of router? I would like to use this information for fingerprinting. I know I can find ...
1
vote
2answers
209 views

Attaching hotspot to existing network - can it be secured?

I used to work for a company that did wireless hotspots, and this is the challenge that was given to me one day. I don't believe there is a secure solution to it, but it still bugs me for some ...

1 2 3 4
15 30 50 per page