Published in Mac O’Clock·PinnedNetwork Warrior: How to use macOS network utilitiesIn a recent article, I wrote about getting around in your wifi environment, using the airport utility available on the terminal, in this article, we will look at Network commands, starting from the most popular and quite mythical, ifconfig. …Apple5 min readApple5 min read
Feb 1, 2022To Mesh or Not to Mesh?If you are suffering from Wi-Fi coverage issues, then you probably heard someone suggesting “ Go and get yourself a Mesh network “ The next thing you will do, is to look for a mesh solution in amazon or your local ISP, and you will be overwhalmed with the number of solutions , promising, not only great coverage but also the lastest Wi-Fi 6 standards There are dozens of great mesh solutions in…Mesh Networks5 min readMesh Networks5 min read
Oct 13, 2021Cracking codes with pythonGreat book for anyone who wants to learn how cryptography works, and how to implement the knowledge using python Im a big gan of cryptography and when it comes to transposition ciphers , substitution ciphers and the classic caesar cipher . you will find me hooked That is why i got excited reading “Cracking codes with python” https://amzn.to/3FHkR45 one of the best books that does both. …Python1 min readPython1 min read
Published in Geek Culture·Aug 19, 2021ARP ( Address Resolution Protocol ) demystifiedWhenever a host needs to contact another host, either in its subnet or in another subnet or maybe on the internet, then it sends an ARP ( Address Resolution Request)Network Security4 min readNetwork Security4 min read
Jul 6, 2021The new Apple iPhone WiFi vulnerabilityLet’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can do harm if your web app doesn’t sanitize the input and treats it as a code Here is a short video I made. See what happens when I connect to that SSIDApple1 min readApple1 min read
Apr 27, 2021Capture Packets on Your FirewallYou can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP Dump Why do we need to do that? It allows you to have a low-level view, up to the hexadecimal representation of the different packets You will see, if packets travel the way they should, if they are dropped and where. It is one of the best diagnostic tools availableWireshark6 min readWireshark6 min read
Apr 7, 2021Factorial Permutations Using PythonWe use the factorial function to multiply the whole number from a chosen number down to one. So for example, 4 factorial (4!) is 4 times 3 times2 times 1, which is equal to 24.Math3 min readMath3 min read
Published in Geek Culture·Apr 2, 2021Transposition Cipher Using Python Random ModuleIn classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher message Substitution and transposition In the substitution algorithm( as used in Caesar cipher and vigenere cipher ) we replace one character with another by shifting its place in the alphabet…Cryptography3 min readCryptography3 min read
Published in InfoSec Write-ups·Mar 31, 2021Fortigate Firewall Split Tunnel ModeIf you’re using an SSL VPN on your Fortigate Firewall, then you have 3 modes to choose from. The first one is a Web mode, where you access resources through a web browser. But with a limited set of protocols. In the second, Full tunnel mode, you get access to all the protocols and applications, but the traffic the full traffic will move through that tunnel. And sometimes…Fortigate4 min readFortigate4 min read
Published in InfoSec Write-ups·Mar 31, 2021Base64 ExplainedBase 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an ASCII representation. Why do we use it? What is the algorithm? And how does it actually work? We use base 64 as a method to encode binary data into an ASCII representation. Why? We do so since many systems and networks just don’t represent binary data as it is supposed to be shown. So how does it actually work?Cryptography3 min readCryptography3 min read