Cybersecurity
(3)- | DHCP Spoofing Attacks
Dynamic Host Configuration Protocol, or DHCP for short, is one of the most useful protocols for a network admin. For large networks with hundreds or thousands of end devices, configuring each one manually with an IP Address would be tedious and error-prone. DHCP allows admins to define a range of IP Addresses and specify other configuration info for devices to obtain automatically. However, like most protocols, it has a security downfall: DHCP Spoofing. !DHCP spoofing attack diagram DHCP spoofing is when a malicious actor sets up an alternate DHCP server on a network to provide false addressing and configuration information to clients.
- | Docker Networking
As I’ve talked about in other posts, Docker is an amazing tool to virtualize applications without the traditional overhead associated with virtual machines. Naturally, the networking options in Docker are just as amazing. There are many different options for networking in Docker, such as bridge, host, overlay, ipvlan, macvlan, or even none. For a great rundown on these types, consider watching this video by NetworkChuck. But today, I’d like to walk you through how I’ve addressed [^1] Docker networking in my own home lab. [^1]: Get it? Addressed? Networking? Sorry... One of the most important concepts in networking is network isolation. Within
- | Simple Steps to Improve Your Online Security
As more of our lives move into the digital world, we must keep our online accounts secure. Weak security will inevitably lead to real-world consequences. Almost all banks have some form of online banking, and an insecure password could allow thousands of your dollars to be in a hacker’s hands. Even impersonation could be a threat, with a hacker being able to extort your friends on email and social media under the guise of a friendly gesture. In the physical world, criminals were limited by geography: you only needed to worry about someone in your neighborhood picking the lock on your
View all tags here.