Using a tool called the Network Mapper (“ nmap”) you can carry out a network scan and detect most if not all the devices on the segment.īefore we get too that we should really find out what the default gateway (router) is on the network. In the real world you may not know the IP address of the victim. Don’t just implement a basic layer-2 network with no additional security or you will regret it.įor this tutorial, I’m going to use my test victim machine on 192.168.1.1. You really should be looking at 802.1x authentication, ARP inspection, and private VLANs as a minimum. I’ve seen so many networks where layer-2 is just implemented as standard. ![]() ![]() ![]() As a network architect, I can’t emphasise enough to implement the necessary security precautions at layer-2.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |