In a break from the usual GPS/Galileo, DNA and C++ posts, here is a bit on 5G and national security. It turns out that through PowerDNS and its parent company Open-Xchange, we know a lot about how large scale European communication service providers work - most of whom are our customers in some way.
In addition, in a previous life I worked in national security and because of that I have relevant knowledge of how governments (your own and foreign ones) “interact” with telecommunication providers.
Tutoriel Wireshard
In this tutorial, we will try to advance your knowledge and understanding of Wireshark to the level where you can use it's many features in an actual network forensic investigation.
la partie 1 https://www.hackers-arise.com/single-post/2018/09/24/Network-Forensics-Wireshark-Basics-Part-1
via https://twitter.com/three_cube/status/1169634327786745856
Script python pour la création d'un environnement réseau virtualisé à base de containers LXC. Cool :-)
Voir aussi Kathará
In these tcpdump examples you will find 22 tactical commands to zero in on the key packets. Know your network with this powerful packet capture tool. Examples for http, icmp, dns, snmp and more.
This page explains how to add network bridge with nmcli with Linux using nmcli command line option so that you can connect VMs directly to LAN without using NAT.
The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying network traffic through a mutational fuzzer. The goal is to begin network fuzzing as quickly as possible, at the expense of being thorough.
MoonGen is a fully scriptable high-speed packet generator built on DPDK and LuaJIT. It can saturate a 10 Gbit/s connection with 64 byte packets on a single CPU core while executing user-provided Lu...
limiter la bande passante utilisée avec wondershaper (sur l'interface) et trickle (par process)
Idem et plus https://unix.stackexchange.com/questions/83888/limit-outgoing-bandwidth-on-an-specific-interface
SPA - Single Packet Authorization fills the gaps in port knocking. : https://www.linuxjournal.com/article/9565
A source for pcap files and malware samples. Since the summer of 2013, this site has published over 1,100 blog entries about malware or malicious network traffic. Almost every post on this site has pcap files or malware samples (or both).
liens doc GNS3
tuto video http://academy.gns3.com/p/gns3-talks-gns3-tutorials-gns3-switching
install on linux https://docs.gns3.com/1QXVIihk7dsOL7Xr7Bmz4zRzTsJ02wklfImGuHwTlaA4/index.html#h.1qr8n6j2iplt
...
VyOS User's guide https://wiki.vyos.net/wiki/User_Guide
IVRE, an open-source network recon framework
A Story About TP-link Device Debug Protocol (TDDP) Research
https://www.pycon.fr/2016/pages/programme.html#Python for SecOps: recherche de vulnérabilités dans les implémentations d'un protocole
Cette présentation s'attachera à illustrer l'emploi de bibliothèques Python dédiées à la rétro-conception de protocoles tels que Netzob et Pylstar. Il sera notamment présenté comment les utiliser pour 1) extraire la machine à états d'une implémentation en boite noire et 2) comparer les machines à états de plusieurs implémentations d'un même protocole pour rechercher des vulnérabilités. Le protocole HTTP2 servira d'exemple.
et installez unbound
voir aussi http://www.bortzmeyer.org/son-propre-resolveur-dns.html
routeur / switch / wifi / ids
and new version with SFP https://omnia.turris.cz/en/ , on indiegogo
Sean showed this x86 one http://www.banggood.com/Z83-Windows-10-Atom-x5-Z8300-2G32G-4K-1000M-Wifi-Miracast-Airplay-DLNA-BT-TV-Box-Windows-Mini-PC-p-1048327.html?rmmds=category no longer available,
replaced by http://www.banggood.com/Z83-II-Intel-Atom-x5-Z8350-2GB-RAM-32GB-ROM-TV-Box-p-1103665.html