![]() ![]() ![]() We will want to exclude the router and ourself from the scan in order to save time. ip a 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 08:00:27:24:30:b1 brd ff:ff:ff:ff:ff:ff inet 192.168.1.2/24 brd 192.168.1.255 scope global noprefixroute eth0 valid_lft forever preferred_lft forever We can also see that my Kali instance is running on 192.168.1.2. ![]() Using a tool called the Network Mapper (“ nmap”) you can carry out a network scan and detect most if not all the devices on the segment.īefore we get too that we should really find out what the default gateway (router) is on the network. In the real world you may not know the IP address of the victim. Don’t just implement a basic layer-2 network with no additional security or you will regret it.įor this tutorial, I’m going to use my test victim machine on 192.168.1.1. You really should be looking at 802.1x authentication, ARP inspection, and private VLANs as a minimum. I’ve seen so many networks where layer-2 is just implemented as standard. As a network architect, I can’t emphasise enough to implement the necessary security precautions at layer-2. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |