Potential DoS attack on a Cisco Layer 2 Switch

I came across an Issue at my work place where in one of our RF networks was frequently going down. This RF network supports wireless handheld inventory management and customer assistant end devices. The initial reason for the network down time was unknown but on

Hello,

I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link

http://bvkmohan.blogspot.in/2011/06/potential-dos-attack-on-cisco-layer-2.html

I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there 🙂

Thank you for visiting and sorry for the inconvenience. See you there!

Advertisements

Linux Network Admin Minions -Part1 : PING

Linux has dozens and dozens of tools for Network troubleshooting, Among them the infamous PING which comes to mind for any person with basic knowledge on network/systems administration (exception : unless they are into application support). This post

## CONTENT MOVED TO BLOGGER! ##
Hello,

I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link

http://bvkmohan.blogspot.in/2011/05/network-administration-troubleshooting.html

I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there 🙂

Thank you for visiting and sorry for the inconvenience. See you there!

TCP flags: Hackers Playground

TCP is a very important protocol on Internet. More than half of the traffic in Internet uses TCP. When it comes to services which require QoS (quality of service) TCP plays a major role whether it be logging into Facebook  or opening a website like Wikipedia.com the underlying protocol which takes care of “reliable” service is TCP. TCP’s dominance over internet has its advantages and disadvantages. The architecture of TCP/IP protocol suit doesn’t have any security features, what it has is algorithms for protocol timers, logics, buffering, mapping, management but there is nothing in code for its security. As Internet evolved the techniques to use it un-ethically also evolved. These techniques are nothing but exploitations of vulnerabilities in the protocol architectures. TCP being the major protocol used in internet, many hacking applications were developed which bypasses its ethical usage (we will study those tools in upcoming posts) so what are those vulnerabilities in TCP ? before we start let us have a brief look at a TCP packet structure.

tcp

Hello,

I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link

http://bvkmohan.blogspot.in/2011/02/tcp-flags-hackers-playground-and.html

I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there 🙂

Thank you for visiting and sorry for the inconvenience. See you there!

 

Disclaimer

1. All the information provided on this Blog (not limited to text and pictures) are for educational purposes only. The Blog or its Authoris no way responsible for any misuse of the information.

2. Packet Crafter is a blog related to Digital Information Security and Network Defense but not a Blog that promotes Hacking(unethical)/Cracking/Software Piracy.

3. This Blog is totally meant to encourage people who are interested in Information Security and other related topics and is no way related to Hacking (unethical) and Cracking”.

4. Anywhere in the blog if the author mentions the term Hack or “Hacking” it should be regarded as Ethical Hackor Ethical Hacking.

5. The Blog or the Author holds no responsibility for the contents in the user comments and the author has the right to modify the Disclaimer at any time without notice.

For further information please send an email to mohan.bvk.143@gmail.com

About

Hi

This blog deals with TCP/IP suite and its Applications, IDS/IPS technologies, Packet Crafters, Firewalls, Hacking, Vodka, Red Bull and all that stuff …

Feel free to criticize and advice :)

Have Fun !

Please read Disclaimer

IDS intro and Philosophy…

What is an IDS ?
from Wikipedia
An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Basically
## CONTENT MOVED TO BLOGGER! ##

Hello,

I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link

http://bvkmohan.blogspot.in/2011/02/what-is-intrusion-detection-system.html

I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there 🙂

Thank you for visiting and sorry for the inconvenience. See you there!