recentpopularlog in

whip_lash : networking   55

home
dn42 is a big dynamic VPN, which employs Internet technologies (BGP, whois database, DNS, etc). Participants connect to each other using network tunnels (GRE, OpenVPN, Tinc, IPsec) and exchange routes thanks to the Border Gateway Protocol. Network addresses are assigned in the 172.20.0.0/14 range and private AS numbers are used (see registry) as well as IPv6 addresses from the ULA-Range (fd00::/8) - see FAQ.
bgp  networking  p2p  vpn 
6 weeks ago by whip_lash
ngrok - secure introspectable tunnels to localhost
Spend more time programming. One command for an instant, secure URL to your localhost server through any NAT or firewall.
development  networking  proxy  tools  tunnel 
8 weeks ago by whip_lash
Potholes to avoid when migrating to IPv6
By the way, none of this is intended to scare people off IPv6. You'll get there eventually. Hopefully these tales just remind you to make the right choices when you do go for it.
ipv6  networking 
11 weeks ago by whip_lash
A deep dive into the AWS network – Txens
If the way about how to implement your network within AWS is well documented, the AWS network itself is not documented at all and we have to merge several sources of information to get a good overview of its design. That’s what this blog post is about.
aws  cloud  networking 
11 weeks ago by whip_lash
22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
Practical SSH examples to take your remote system admin game to the next level. Commands and tips to not only use SSH but master ways to move around the network.
ssh  networking  linux  network  sysadmin 
12 weeks ago by whip_lash
SANS Institute: Reading Room - Cloud Computing
Companies using AWS (Amazon Web Services) will find that traditional means of full packet capture using span ports is not possible. As defined in the AWS Service Level Agreement, Amazon runs certain aspects of the cloud platform and does not give customers access to physical networking hardware. Although access to physical network equipment is limited, packet capture is still possible on AWS but needs to be architected in a different way.
aws  networking  security 
november 2018 by whip_lash
How Does The Kubernetes Networking Work? : Part 1 - Level UpLevel Up
To stay focused and less loaded, I have decided to split the post into three different posts. The first part includes containers and pods. The second part includes service examination and the extraction layers. They allow the pods to be ephemeral. The third part includes ingress and accumulating traffic to the pods from outside the cluster.
kubernetes  networking 
october 2018 by whip_lash
Samy Kamkar - pwnat: NAT to NAT client-server communication
Simply put, this is a proxy server that works behind a NAT,
even when the client is behind a different NAT, without any
3rd party or network changes.

There is no middle man, no proxy, no 3rd party,
no UPnP/STUN/ICE required, no spoofing, and no DNS tricks.
linux  networking  tool  proxy 
september 2018 by whip_lash
A practical look at basic AWS Networking with Terraform | OpsTips
A conventional AWS Networking Tutorial out there using Terraform doesn't go around the concepts of AWS Networking. Check out how to provision an AWS VPC with multiple subnets and configure security groups using Terraform.
aws  networking  terraform 
july 2018 by whip_lash
Tcpdump Examples - 22 Tactical Commands | HackerTarget.com
Practical tcpdump examples to lift your network troubleshooting and security testing game.
tcpdump  networking  linux 
june 2018 by whip_lash
Malicious Network Traffic From /bin/bash - SANS Internet Storm Center
exec 5<> /dev/tcp/blog.rootshell.be/80
printf "GET / HTTP/1.0\nHost: blog.rootshell.be\n" >&5
cat <&5
exec 5>&-
bash  c2  networking  hacking  pentest  security  linux  postexploitation 
april 2018 by whip_lash
Discussions - how to ssh into a gns3 router using putty or teraterm - hope this can help someone - GNS3
The text in the graphic below is posted here also to make it easier to read which includes how to setup ssh on a cisco router.
cisco  gns3  networking  ssh 
march 2018 by whip_lash
Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic and Tor traffic as well as potential malicious traffic including data involved in the communication.
networking  pcap  github  python 
february 2018 by whip_lash
Netflix once loved talking about net neutrality - so why has it suddenly gone quiet?
Netflix is now such a household staple that even Comcast, the owner of NBC and other TV networks, has incorporated the video service into its set-top boxes. That makes Netflix as easy to watch as any other cable channel. Other cable providers have since followed suit.

That is one of the reasons that Hastings softened his tone on net neutrality. By last May, he told a technology conference during an onstage interview that net neutrality is "not our primary battle at this point."

GOT MINE SCREW YOU.
netflix  networking  neutrality 
january 2018 by whip_lash
QOTD: Are You Ready For Showroom Neutrality? - The Truth About Cars
Think of the benefits to the public if every dealer was treated as a utility. You could get a Ferrari delivered to you in Peoria, or a Tesla in rural Alabama. The dealers might not like it, and some of the manufacturers might not like it, but the same was true of Comcast and Verizon during the Net Neutrality period. Most people don’t have all the dealerships near them. Why should they be penalized for a monopolistic lack of common infrastructure?

Or maybe something seems wrong to you about that. Can you articulate it logically? Or will the tide of American business continue to turn in the favor of the oligarch disrupters, regardless of its impact on local business?

A MODEST PROPOSAL
network  networking  cars  satire 
december 2017 by whip_lash
GitHub - securesocketfunneling/ssf: Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
github  networking 
november 2017 by whip_lash
Online investigation tool - IP, DNS, MX, WHOIS and SEO tools
Tcpiputils.com provides the ultimate online investigation tool. See detailed information about every IP address, domain name and provider. Perform network tests like DNS lookup, email testing and WHOIS lookup.
domain  networking  tool  IP  Whois  dns 
december 2016 by whip_lash
PacketBomb – Packet Analysis Explosion
Real people with real network and application performance problems. PacketBomb helped them understand the issues and in some cases completely resolve the issue.
networkengineering  networking  analysis  troubleshooting  pcap  class 
december 2015 by whip_lash
arp-ping.exe
Arp-ping.exe is an implementation of "ping" over arp lookup. It is similar in behavior to the "arping" *nix program, but is an independent implementation and works somewhat differently internally. In particular, arp-ping.exe does not require Cygwin to compile nor that there be a packet capture driver (pcap) installed.
arp  ping  arping  networkengineering  networking  windows 
october 2014 by whip_lash
www.nanog.org/meetings/nanog47/presentations/Sunday/RAS_Traceroute_N47_Sun.pdf
How traceroute works, including city codes commonly used in router names, etc.
traceroute  networking  diagnostics 
march 2013 by whip_lash
Configuring the Windows Time Service
This article walks you through the process of setting up an authoritative time server for a Windows Server 2003-based network running Active Directory. The article outlines procedures for syncing to both an internal and external time source, and also lists additional resources for configuring the Windows Time service and troubleshooting time synchronization problems.
sysadmin  time  microsoft  networking  windows 
july 2010 by whip_lash
Navigating Cisco.com Documentation - Packet Life
People often complain that Cisco's online documentation is too difficult to navigate, but after digging through it numerous times to find references for the many blog articles I've written, I think it merely takes a bit of strategy. That's why I decided to write this article.
cisco  networking  documentation  guide 
may 2010 by whip_lash
Network Tools: DNS,IP,Email
All of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool. Input a domain name or IP Address or Host Name. Links in the results will guide you to other relevent tools and information. And you'll have a chronological history of your results.
dns  tools  email  networking  spam 
december 2009 by whip_lash
Pingtest.net - The Global Broadband Quality Test
Use Pingtest.net to determine the quality of your broadband Internet connection. Streaming media, voice, video communications, and online gaming require more than just raw speed. Test your connection now to get your Pingtest.net rating and share the result with others!
internet  tools  networking  broadband  sysadmin 
november 2009 by whip_lash
When do net neutrality "anecdotes" become "data"? - Ars Technica
So which alleged "anecdotes" are we talking about here? Two stand out in the United States. The first would (famously) be FCC sanctions in August of 2008 against Comcast for slowing down BitTorrent file sharing. The second was the 2005 Madison River Communications case, in which the North Carolina phone company/ISP was accused of blocking Vonnage VoIP traffic, and eventually settled with the FCC over the matter.

The question is whether these incidents are sufficient to merit further action. It's a tough problem, for which we have summoned some unconventional help. Welcome to the Ars Technica Policy Debate Theatre. Please switch off your cell phones; our performance is about to begin.
networking  netw 
november 2009 by whip_lash
GNS3 | Graphical Network Simulator
GNS3 is a graphical network simulator that allows simulation of complex networks.

To allow complete simulations, GNS3 is strongly linked with :

* Dynamips, the core program that allows Cisco IOS emulation.
* Dynagen, a text-based front-end for Dynamips.
* Pemu, a Cisco PIX firewall emulator based on Qemu.
cisco  network  software  networking  networengineering  router 
september 2009 by whip_lash
Open Source Network Gateway | Untangle
Untangle protects you from malicious incoming Internet threats such as viruses, spyware, hackers, identity thieves and more.
opensource  networking  security  software  tools  sysadmin  free 
july 2009 by whip_lash
Network Notepad Homepage
Network Notepad is a Freeware program for creating interactive network diagrams.
software  freeware  network  networking 
april 2009 by whip_lash

Copy this bookmark:





to read