Unknown's avatar

All posts by thecybersecurityman

Switch Security

I've made several posts about switches, how they function, and the amazing features they possess, but now it's time to talk about their security. Let's start with switching loops. Switching Loops and STP/RSTP In some cases, a network can develop a "switching loop," sometimes called a "bridging loop." In networks with a lot of switches, ...

Virtual Local Area Networks (VLANs)

Edit (7/18/2018) - This discussion focuses on Virtual Local Area Networks (VLANs). It is an introduction and a difficult concept to grasp for beginners. For intermediate-learners, I'd suggest reading this post instead. Older Networks: Our LANs can get messy. On our typically older corporate networks, there were many switches that separated different organizational units of ...

PenTest Edition: My Favorite Wi-Fi Assessment Tools – 2018

Penetration testing and security analysis is an integral aspect of cybersecurity. The ability to master some of these tools is certainly indispensable. Penetration testers and other cybersecurity professionals use these tools everyday to examine the security posture of their networks. All of these tools are free to download; however, whether you can use them or ...

Port Mirroring on Switches

Modern switches have a lot of cool, useful features that make these devices simple to manage, but perhaps, more difficult to configure. In my last post about switches, I mentioned I'd go into a little more detail about the features that switches have to offer. One of the first features I mentioned was "port mirroring." ...

Switches Are The Way to Go

A "switch" is a Layer 2 (Data Link) device that largely replaced hubs in the early days of networking. These days, it's hard to imagine any network tech installing a hub over a switch. The greatest benefit of a switch over a hub is that is has "intelligence," well, managed switches do, at least. Managed ...