In a recent article, I wrote about getting around in your wifi environment, using the airport utility available on the terminal, in this article, we will look at Network commands, starting from the most popular and quite mythical,
ifconfig. Once you get more familiar with your Mac Terminal, the sky is the limit, you can do magical things, on your Mac with text-based access to your operating system using its command-line interface (and not just the basics, as creating files, directories, and assign permissions).
ifconfig command will list all available network interfaces, including their IPV4 and IPV6 addresses, their…
Let’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can do harm if your web app doesn’t sanitize the input and treats it as a code
Here is a short video I made. See what happens when I connect to that SSID
Why do we need to do that?
It allows you to have a low-level view, up to the hexadecimal representation of the different packets
You will see, if packets travel the way they should, if they are dropped and where. It is one of the best diagnostic tools available
In classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher message
In the substitution algorithm( as used in Caesar cipher and vigenere cipher ) we replace one character with another by shifting its place in the alphabet with a pre-defined number of places
Let us use the python pseudo-random number generator module to take plain text and use transposition operation, with the key being the random seed ( the initial value, where the random generator start its math operations )
We will start and import the random…
The first one is a Web mode, where you access resources through a web browser. But with a limited set of protocols.
In the second, Full tunnel mode, you get access to all the protocols and applications, but the traffic the full traffic will move through that tunnel. And sometimes it is not requested. ( Takes resources from your FortiGate firewall )
The third mode is a Split Tunnel mode where you can access specific resources, and the rest of the traffic will move through the public Internet.
Our topology is as follows. We have our LAN interface. And we…
We use base 64 as a method to encode binary data into an ASCII representation.
We do so since many systems and networks just don’t represent binary data as it is supposed to be shown. So how does it actually work?
Let’s do it by example. Let’s take the word FortiGate. Each character has an eight-bit representation.
I have created 2 courses and 2 books, to teach you the theory and practice of a fortigate firewall
What will you learn :