www.securityinobscurity.com
Open in
urlscan Pro
2600:9000:223c:6a00:13:187e:af40:93a1
Public Scan
URL:
https://www.securityinobscurity.com/
Submission: On November 10 via automatic, source certstream-suspicious — Scanned from DE
Submission: On November 10 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
SECURITY IN OBSCURITY Welcome to an information security blog by Jeff Stein THOUGHTS EXPLOITING NETWORKS WITH ARP POISONING, JULY 2020 The Address Resolution Protocol (ARP) is a network protocol used by a router to map layer three IP addresses to layer two MAC addresses for systems communicating on the network. The records stored by the router are held in the form of a table (ARP table) that allows the router to more quickly identify where to send network traffic. Given the inherent trust a system will place in network equipment and the information provided by it, the ARP protocol can be used by an attacker to manipulate the network traffic sent between system. READ MORE >> -------------------------------------------------------------------------------- SCRIPTS WORDLIST-VARIANT.PY, MARCH 2020 The script will import a text list of words and add variants of each word to the list. The script was ideally designed to increase the size and speed in which a viable wordlist can be generated for use in performing a dictionary attack against passwords or Wi-Fi pre-shared keys however the script can be used for numerous purposes where word variants are needed. The script is designed for any system with Python installed, leveraging Python 3. READ MORE >> ABOUT ME My name is Jeff Stein. I have been working in IT for over 10 years with a focus on information security for much of that time. I enjoy exploring ideas in information security and the broader technology space so I set up this blog to share some of what I have learned. -------------------------------------------------------------------------------- RECENT POSTS * Exploiting networks with ARP Poisoning Executing a Man-in-the-Middle attack * Securing 0365 SharePoint Online * Securing 0365 Exchange Online * Securing 0365 Accessing Services -------------------------------------------------------------------------------- PUBLISHED ARTICLES * User Lifecycle Management Cyber Defense Magazine * Using Email Authentication Standards Cyber Defense Magazine * Importance of HTTPS to your Website Enterprise Security Magazine * Implement Vulnerability Management Enterprise Security Magazine -------------------------------------------------------------------------------- COURSES * Command and Control with PoshC2 Pluralsight * Initial Access with King Phisher Pluralsight * Credential Access with Cain & Abel Pluralsight -------------------------------------------------------------------------------- Disclaimer | Contact | RSS Powered by w3.css