www.securityinobscurity.com Open in urlscan Pro
2600:9000:223c:6a00:13:187e:af40:93a1  Public Scan

URL: https://www.securityinobscurity.com/
Submission: On November 10 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

SECURITY IN OBSCURITY

Welcome to an information security blog by Jeff Stein


THOUGHTS

EXPLOITING NETWORKS WITH ARP POISONING, JULY 2020

The Address Resolution Protocol (ARP) is a network protocol used by a router to
map layer three IP addresses to layer two MAC addresses for systems
communicating on the network. The records stored by the router are held in the
form of a table (ARP table) that allows the router to more quickly identify
where to send network traffic. Given the inherent trust a system will place in
network equipment and the information provided by it, the ARP protocol can be
used by an attacker to manipulate the network traffic sent between system.

READ MORE >>

--------------------------------------------------------------------------------


SCRIPTS

WORDLIST-VARIANT.PY, MARCH 2020

The script will import a text list of words and add variants of each word to the
list. The script was ideally designed to increase the size and speed in which a
viable wordlist can be generated for use in performing a dictionary attack
against passwords or Wi-Fi pre-shared keys however the script can be used for
numerous purposes where word variants are needed. The script is designed for any
system with Python installed, leveraging Python 3.

READ MORE >>

ABOUT ME

My name is Jeff Stein. I have been working in IT for over 10 years with a focus
on information security for much of that time. I enjoy exploring ideas in
information security and the broader technology space so I set up this blog to
share some of what I have learned.

--------------------------------------------------------------------------------

RECENT POSTS

 * Exploiting networks with ARP Poisoning
   Executing a Man-in-the-Middle attack
   
 * Securing 0365
   SharePoint Online
   
 * Securing 0365
   Exchange Online
   
 * Securing 0365
   Accessing Services
   

--------------------------------------------------------------------------------

PUBLISHED ARTICLES

   
 * User Lifecycle Management
   Cyber Defense Magazine
 * Using Email Authentication Standards
   Cyber Defense Magazine
 * Importance of HTTPS to your Website
   Enterprise Security Magazine
 * Implement Vulnerability Management
   Enterprise Security Magazine

--------------------------------------------------------------------------------

COURSES

 * Command and Control with PoshC2
   Pluralsight
 * Initial Access with King Phisher
   Pluralsight
 * Credential Access with Cain & Abel
   Pluralsight

--------------------------------------------------------------------------------


Disclaimer | Contact | RSS
Powered by w3.css