Skip to content

Meta

  • Register
  • Log in
ItsyourIP.com

Your gateway to Internet

Primary Navigation Menu
Menu
  • About
  • Contact Me
  • Free Antivirus
  • Free Firewall
  • Sitemap

Security

VoIP Hopper – Opensource Security tool to test VoIP

2008-04-17
By: admin
In: OpenSource, Security, voip
Tagged: Avaya, CDP, Cisco, ethernet, OpenSource, switch, VLAN-Hopping, voip, VoIP-Hopping

VoIP Hopper is a Unix/Linux based free opensource security tool that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches. VoIP Hopper mimicks the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments to hope into the Voice VLAN.  VoIP Hopper is both a VLAN Hop test tool and a tool to test VoIP infrastructure security.  If you’re new here, you may want to subscribe to my RSS feed. Thanks for visiting!Read More →

How to prevent VLAN Hopping in Cisco Switches

2008-04-17
By: admin
In: Cisco, Security
Tagged: 802.1Q, Cisco, Double-Tagging, Security-Exploit, switch-spoofing, Tunnel, vlan, VLAN-Hopping

A malicious user can easily gain access to data on another VLAN to which he is not authorised to access using VLAN hopping. A VLAN Hoping attack can be launched by using a Switch Spoofing or Double Tagging of 802.1q trunking protocol. To have a quick insight into VLAN Hopping, click here. You can prevent VLAN Hopping in Cisco Switches as follows:Read More →

VLAN Hopping – Layer 2 Security exploit bypass Layer 3 security

2008-04-17
By: admin
In: Security
Tagged: 802.1Q, DTP, Layer2, Layer3, Security, switch-spoofing, vlan, VLAN-Hopping

VLAN Hopping is a Layer 2 security exploit by which a malicous user connected to a switchport on a Switch assigned to a VLAN can hop on and gain access to another VLAN which otherwise is not accessible. This security exploit allows the malicous hacker to bypass the IP Securities implemented at Layer 3.Read More →

Set Login Restrictions to protect Cisco IOS Routers & Switches

2008-03-20
By: admin
In: Cisco, Security
Tagged: audit-logs, Cisco, Enhancements, failed-logins, ios, Login, router, Security, switch

While no security is fool proof, it is important that we do as much as we can to ensure maximum protection on our netowrk devices like Routers and Switches. Cisco IOS has enhanced Login restriction features which can control login attempts to it. This includes time delay between failed login attempts, block period after a set of failed login attempts and audit logs of successful and failed login attempts. These login restrictions provides more control and make it that more harder for unauthorised accesses and prevent against Dictionary based DoS attacks.Read More →

How to configure Site-Site IPSec VPN in Cisco Routers (IOS)

2008-02-22
By: admin
In: Cisco, Security, vpn
Tagged: 3DES, AES, ah, authentication-header, encryption, esp, firewall, ipsec, SHA, vpn

Virtual Private Network (VPN) is a network which uses a shared network infrastructure (Internet) which allows a secure access between two networks or securely connects a remote user to his corporate network. Let's check out here how to configure a Site to Site VPN using a Pre-shared Key in Cisco Routers running Cisco IOSRead More →

How to enable Path MTU Discovery in Juniper Netscreen Firewalls (ScreenOS)

2008-02-20
By: admin
In: juniper, Security, vpn
Tagged: Discovery, encapsulation, ipsec, juniper, mtu, netscreen, Path MTU, screenos, vpn

If you have site to site IPSec VPNs configured between two network with your Juniper Netscreen or SSG firewalls and clients from one network access servers or services from the other network then it is advisable to enable Path MTU Discovery support on the Juniper firewalls. Juniper Netscreen or SSG firewalls running Screen OS by default disable the Path MTU Discovery support. This means, when an IP Packet with DF bit set ("1") in the ip Header and its size after IPSec Encapsulation is more the MTU of the Juniper VPN Firewall arrives at the VPN Firewall, the firewall will ignore the "DF" bit andRead More →

Yersinia – Free Network Testing tool for CDP,STP,VTP,DHCP,DTP,ISL,802.1Q,802.1X

2008-02-19
By: admin
In: IP Tools, Security, Security/Penetration Testing
Tagged: 802.1Q, 802.1X, bpdu, CDP, DHCP, DTP, ISL, Network-Testing, stp, VTP, Yersinia

Yersinia is a free Network Penetration testing tool used to test and analyse some of the most commonly used protocols on your network. Penetration testing tools of this kind will provide deep insight on network security issues. Yersinia is a UNIX based tool that works on Linux, Solaris 8, FreeBSD. NOTE: The tool is described as a tool to perform network tests and exercise responsible actions when performing tests which includes obtaining the permission from responsible authorities. DO NOT USE THIS TOOL FOR ANY UNAUTHROSIED HACKING PURPOSESRead More →

Posts navigation

1 2 … 5 Next



Categories

  • ARP
  • Browser
  • Cisco
  • Database
  • Debian
  • DHCP
  • DNS
  • DNS Records
  • Firefox
  • internet-explorer
  • IP Tools
  • juniper
  • Linux
  • MySQL
  • Network Inventory
  • Networking
  • OpenSource
  • OpenSource Clustering
  • Opensource Firewall
  • OpenSource LoadBalancer
  • Opensource NAC
  • OpenSource Router
  • Opensource VPN
  • proxy
  • Python
  • Redhat
  • Secure Shell(SSH)
  • Security
  • Security Audit
  • Security/Penetration Testing
  • Sniffing/PacketCapture
  • Solaris
  • Tools
  • Ubuntu
  • Unix
  • VirtualBox
  • voip
  • vpn
  • Windows
  • Wireless

Tags

acl Browser Cisco DHCP DNS DNS Records encryption Firefox firewall gateway High-Availability icmp internet ios ip ip-address ipsec IP Tools juniper Linux mtu network OpenSource Opensource Firewall OpenSource LoadBalancer proxy Redhat registry rhel route router routers Security snmp Solaris switch tcp tcpip udp Unix virtual-server vlan vpn Windows Wireless

Recent Posts

  • MySQL: how to delete all records from a table
  • Python: Remove last ‘n’ characters of a string
  • How to block select in PuTTY
  • How to enable/disable Right-click paste in PuTTY
  • How to change the HOST key in Oracle Virtualbox Manager
  • FileZilla FTP Client configuration through BlueCoat proxy
  • Unable to delete Stale/Obsolete statc routes in Cisco IOS
  • How to create VLAN Interfaces for InterVLAN Routing in Cisco IOS
  • High CPU usage when SNMP is enabled in Cisco Routers
  • Import WyseTerm Host List from one user to another in Windows

RSS Secunia Advisories

RSS MS Security Bulletin

RSS US-CERT Vulnerability

RSS SANS

Recent Comments

  • Forwarding ICMP over a server without redirects on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • M.Pasha on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • Steve Pollard on How to prevent VLAN Hopping in Cisco Switches
  • Routing issue Sophos UTM Home <-> Cisco ASA 5510 for only linux hosts? - Sophos User Bulletin Board on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • BranchCache – Hosted Cache Mode File Server Tutorial | theezitguy on HowTo: Add persistent Static Routes in Windows

Designed using Responsive Brix Premium. Powered by WordPress.