Open in app

Sign In

Write

Sign In

ofer shmueli
ofer shmueli

234 Followers

Home

About

Published in Mac O’Clock

·Pinned

Network Warrior: How to use macOS network utilities

In a recent article, I wrote about getting around in your wifi environment, using the airport utility available on the terminal, in this article, we will look at Network commands, starting from the most popular and quite mythical, ifconfig. …

Apple

5 min read

Network Warrior: How to use macOS network utilities
Network Warrior: How to use macOS network utilities
Apple

5 min read


Feb 1, 2022

To Mesh or Not to Mesh?

If you are suffering from Wi-Fi coverage issues, then you probably heard someone suggesting “ Go and get yourself a Mesh network “ The next thing you will do, is to look for a mesh solution in amazon or your local ISP, and you will be overwhalmed with the number of solutions , promising, not only great coverage but also the lastest Wi-Fi 6 standards There are dozens of great mesh solutions in…

Mesh Networks

5 min read

To Mesh or Not to Mesh?
To Mesh or Not to Mesh?
Mesh Networks

5 min read


Oct 13, 2021

Cracking codes with python

Great book for anyone who wants to learn how cryptography works, and how to implement the knowledge using python Im a big gan of cryptography and when it comes to transposition ciphers , substitution ciphers and the classic caesar cipher . you will find me hooked That is why i got excited reading “Cracking codes with python” https://amzn.to/3FHkR45 one of the best books that does both. …

Python

1 min read

Cracking codes with python
Cracking codes with python
Python

1 min read


Published in Geek Culture

·Aug 19, 2021

ARP ( Address Resolution Protocol ) demystified

Whenever a host needs to contact another host, either in its subnet or in another subnet or maybe on the internet, then it sends an ARP ( Address Resolution Request)

Network Security

4 min read

ARP ( Address Resolution Protocol ) demystified
ARP ( Address Resolution Protocol ) demystified
Network Security

4 min read


Jul 6, 2021

The new Apple iPhone WiFi vulnerability

Let’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can do harm if your web app doesn’t sanitize the input and treats it as a code Here is a short video I made. See what happens when I connect to that SSID

Apple

1 min read

The new Apple iPhone WiFi vulnerability
The new Apple iPhone WiFi vulnerability
Apple

1 min read


Apr 27, 2021

Capture Packets on Your Firewall

You can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP Dump Why do we need to do that? It allows you to have a low-level view, up to the hexadecimal representation of the different packets You will see, if packets travel the way they should, if they are dropped and where. It is one of the best diagnostic tools available

Wireshark

6 min read

Capture Packets on Your Firewall
Capture Packets on Your Firewall
Wireshark

6 min read


Apr 7, 2021

Factorial Permutations Using Python

We use the factorial function to multiply the whole number from a chosen number down to one. So for example, 4 factorial (4!) is 4 times 3 times2 times 1, which is equal to 24.

Math

3 min read

Factorial Permutations Using Python
Factorial Permutations Using Python
Math

3 min read


Published in Geek Culture

·Apr 2, 2021

Transposition Cipher Using Python Random Module

In classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher message Substitution and transposition In the substitution algorithm( as used in Caesar cipher and vigenere cipher ) we replace one character with another by shifting its place in the alphabet…

Cryptography

3 min read

Transposition Cipher Using Python Random Module
Transposition Cipher Using Python Random Module
Cryptography

3 min read


Published in InfoSec Write-ups

·Mar 31, 2021

Fortigate Firewall Split Tunnel Mode

If you’re using an SSL VPN on your Fortigate Firewall, then you have 3 modes to choose from. The first one is a Web mode, where you access resources through a web browser. But with a limited set of protocols. In the second, Full tunnel mode, you get access to all the protocols and applications, but the traffic the full traffic will move through that tunnel. And sometimes…

Fortigate

4 min read

Fortigate Firewall Split Tunnel Mode
Fortigate Firewall Split Tunnel Mode
Fortigate

4 min read


Published in InfoSec Write-ups

·Mar 31, 2021

Base64 Explained

Base 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an ASCII representation. Why do we use it? What is the algorithm? And how does it actually work? We use base 64 as a method to encode binary data into an ASCII representation. Why? We do so since many systems and networks just don’t represent binary data as it is supposed to be shown. So how does it actually work?

Cryptography

3 min read

Base64 Explained
Base64 Explained
Cryptography

3 min read

ofer shmueli

ofer shmueli

234 Followers

YouTube.com/fortitip

Following
  • RomanAcademy

    RomanAcademy

  • Anangsha Alammyan

    Anangsha Alammyan

  • Ramin Zamani

    Ramin Zamani

  • Tim Denning

    Tim Denning

  • Will Lockett

    Will Lockett

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech