Skip to content

Brezular's Blog

Networking & Virtualization & Linux

  • News
  • Security
  • Forensics
  • VOIP
  • RPi
  • Scripts
  • AI
    • Alpaca
    • Stable Diffusion
  • Cisco
    • ASAv
    • Cisco CCNP
    • CSR1000v
    • IOS
    • IOS-XR
  • Download
    • Appliances
    • Binaries
    • Scripts
  • GNS3
    • Dynamips
    • GNS3 labs
    • IOU
    • IOUlive
  • Linux
    • Clonezilla
    • Debian
    • Fedora
    • L3 Linux switch
    • Linux Core
    • ntopng
    • Syslog-ng
  • Networking
    • Alcatel-Lucent
    • Arista
    • Check Point
    • ClearOS
    • EXOS
    • HP
    • Huawei
    • IPFire
    • Juniper
    • Mikrotik
    • Noction Flow Analyzer
    • OpenSwitch
    • Openvswitch
    • Pfsense
    • Titanium
    • vIOS
    • VyOS
  • Scripting
    • Scapy
  • Virtualization
    • Qemu
    • VirtualBox
    • VMware

Category: Security

  • Home
  • Security
  • Scapy
  • Security

Dynamic ARP Inspection in DHCP Environment

  • Radovan Brezula
  • February 1, 2024

In ARP Spoofing Attack article, we provided a Python script that an attacker can use […]

  • Scapy

Protecting Against MAC Flooding Attack

  • Radovan Brezula
  • January 3, 2024

In the “MAC Flooding Attack” tutorial, we explained how to easily saturate the MAC address […]

  • Security

Cisco Dynamic Trunk Protocol Hacking with Scapy

  • Radovan Brezula
  • December 3, 2023

A port on a Cisco switch is either an access port or a trunk port. […]

  • Security

Restoring Hashcat Cracking

  • Radovan Brezula
  • November 1, 2023

Hash cracking is often paused or stopped for various reasons. Hashcat has a Pause button […]

  • Security

WPA2 Cracking On NVIDIA with CUDA

  • Radovan Brezula
  • October 1, 2023

In the previous tutorial “Cracking WPA/WPA2 Pre-shared Key Using GPU”, we showed how to crack […]

  • Scapy
  • Security

MAC Flooding Attack

  • Radovan Brezula
  • April 1, 2023

Unlike a hub, a switch is a network device that typically does not forward a […]

  • Scapy
  • Security

ARP Spoofing Attack with Scapy

  • Radovan Brezula
  • February 1, 2023

When an IP packet is sent from one host to another in a local area […]

  • Scapy
  • Security

DoS Attack Using Spanning Tree Protocol

  • Radovan Brezula
  • January 3, 2023

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology […]

  • Security

Capturing Decrypted TLS Traffic with Arkime

  • Radovan Brezula
  • December 1, 2022

In a previous post, we have discussed how to decrypt TLS traffic using a transparent […]

  • Security

Decrypting TLS Traffic with PolarProxy on Client PC

  • Radovan Brezula
  • October 1, 2022

The tutorial provides detailed steps for decrypting HTTPS traffic generated on a client computer with […]

Posts navigation

Older posts

Pages

  • Home
BGP
Intelligent Routing Platform

BGP management
Automated BGP Network Management

What is NetFlow?

NetFlow
NetFlow vs. sFlow vs. IPFIX vs. NetStream. Network Traffic Analysis and Monitoring.

BGP Security: BGPsec Protocol

BGP protocol
BGPsec is an integral part of the BGP protocol, and thus, BGP routers must do the…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 312 other subscribers

Categories

Top Posts & Pages

  • Enterprise Network on GNS3 - Part 1 - Introduction
  • Configuring the Cisco Aironet AP 1142
  • BGP on Cisco IOS XRv - Prefix-Sets and Route-Policies
  • Booting Raspberry Pi 3 B from USB Drive
  • VyControl - Web UI for VyOS Firewall
  • Dell Optiplex 7050 SFF Upgrade for Proxmox
  • Juniper vQFX on GNS3
  • How to Configure BurpSuite to use Tor as Proxy
  • Juniper vMX on GNS3
  • Debian Installation on Raspberry Pi
Copyright © 2025 Brezular's Blog