Category Archives: Security

Create ACL Rules with Wireshark

I stumbled onto this wireshark feature by accident really but thought I would share a little bit about it. Essentially what wireshark does is allows you to review all the captured packets and then a single packet in more detail. Continue reading

Posted in Networking, Security | Tagged , , , , | Leave a comment

Capturing Traffic with the Cisco ASA

I have written quite a few things lately about capturing traffic so why not write another? This time we will be taking a look at capturing data from another key place in the network; the firewall. Continue reading

Posted in Networking, Security | Tagged , , , , , , | Leave a comment

SSH Tunneling and Proxying

Today I want to talk about the flexibility, security, and convenience of using SSH Tunneling and Proxying to connect to your remote network devices. The SSH tunnel will act as a VPN of sorts to get us inside the network where remote access is otherwise not available. These examples will also wrap the traffic in a layer of security since all SSH tunnel traffic is encrypted. To get started let’s have a look at the diagram below: The laptop is our remote user and the network on the right is the network with some devices that we could like to … Continue reading

Posted in Networking, Security | Tagged , , | 6 Comments

Passive Sniffing on Windows

With Linux you can configure a sniffing only port relatively easy. Put it in promiscuous mode without an IP and sniff away passively. With windows, there is typically always an IP address assigned to an interface. If not statically assigned the interface will search for DHCP and will ultimately end up with an address in the 169 range if no address information is found. Either way there will be information from your machine showing up in a full, unfiltered packet capture. To get around this you will actually want to disable the TCP/IP stack for that interface. If this is … Continue reading

Posted in Networking, Security | Tagged , , | Leave a comment