Dec 21, 2025 · 5 min read · Introduction Computer networks work based on trust. Users inside a LAN trust each other to share information between them. One such important protocol is ARP (Address Resolution Protocol), which maintains a mapping of an IP address to the correspondi...
NNube commentedAug 17, 2025 · 5 min read · 1. The Day the Helpdesk Lit Up Tuesdays in the SOC are always the most mundane of days. The hum of the AC, the quiet whir of monitors, and the sound of the lid closing on a keyboard to close out tickets — that's as exciting as it gets. At 10:42 AM ( ...
Join discussionAug 15, 2025 · 3 min read · above picture : ARP request & reply, but with less small talk. Ever sent a letter with just the name and not the full address? You've got the name, okay, but… which house do you knock on? That's more or less your computer without ARP. ARP (Address Re...
Join discussionApr 6, 2024 · 4 min read · The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC (Media Access Control) address, associated with a given internet layer address, typically an IPv4 address. This protocol oper...
Join discussion
Feb 26, 2024 · 5 min read · To gain insights into the underlying protocols and strengthen defenses against attacks like ARP spoofing, several tools are available that can help us in network monitoring, analysis, and security. Check my list of the best tools to hack or detect AR...
Join discussion
Nov 16, 2023 · 2 min read · Introduction: In the ever-shifting landscape of cybersecurity, organizations grapple with a myriad of threats and vulnerabilities. Meeting these challenges head-on demands sophisticated tools and frameworks, and one such indispensable component is th...
Join discussionAug 22, 2023 · 2 min read · Spoofing is a cyber attack where a malicious actor pretends to be someone or something else to gain unauthorized access or deceive a user. Detecting and preventing spoofing attacks involves using techniques like: Authentication Mechanisms: Implement ...
Join discussion
May 17, 2023 · 2 min read · Bluetooth devices can be vulnerable to hacking, although the level of risk can vary depending on the specific device and its security measures. Bluetooth technology allows wireless communication between devices over short distances, and while it offe...
Join discussion
Sep 30, 2022 · 2 min read · Montamos un entorno montado con tres dispositivos en la misma red -una máquina cliente ubuntu - 192.168.10.1 -la máquina atacante - 192.168.10.2 -un ubuntu server - 192.168.10.254 ifconfig eth0 192.168.10.1 netmask 255.255.255.0 ifconfig eth0 192.1...
Join discussion