Kali Linux on EVE-NG

Kali Linux on EVE-NG

Kali Linux is a Linux distro based on Debian that brings a ton of forensic/penetration testing tools pre-installed. Here is a small list of what you can find in Kali: John the Ripper - Password Attacks Maltego - Information Gathering Wireshark - Sniffing & Spoofing Yersinia - Vulnerability Analysis Aircrack-ng - Wireless Attacks Grabber - … Continue reading Kali Linux on EVE-NG

Advertisements
Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

The last post we talk about VTI to establish a connection between to points over the Internet. This connection was secure via IPSec and allowed dynamic routing protocols through it. The challenge in this post is to escalate this topology into multipoints, which is the usual topologies that we can encounter in the real world. … Continue reading Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Routing Through IPSec Without GRE – Using VTI’s

Dynamic Routing Through IPSec Without GRE – Using VTI’s

On a previous post, we created a GRE tunnel to permit routing protocol through an insecure (Internet) network and protected it with IPSec. As you all should know GRE adds another layer of encapsulation (at least 4 bytes), which means more overhead. One major advantage compared with the traditional method of IPSec is that, since … Continue reading Dynamic Routing Through IPSec Without GRE – Using VTI’s