Skip to content

Brezular's Blog

Networking & Virtualization & Linux

  • News
  • Security
  • Forensics
  • VOIP
  • RPi
  • Scripts
  • AI
    • Alpaca
    • Stable Diffusion
  • Cisco
    • ASAv
    • Cisco CCNP
    • CSR1000v
    • IOS
    • IOS-XR
  • Download
    • Appliances
    • Binaries
    • Scripts
  • GNS3
    • Dynamips
    • GNS3 labs
    • IOU
    • IOUlive
  • Linux
    • Clonezilla
    • Debian
    • Fedora
    • L3 Linux switch
    • Linux Core
    • ntopng
    • Syslog-ng
  • Networking
    • Alcatel-Lucent
    • Arista
    • Check Point
    • ClearOS
    • EXOS
    • HP
    • Huawei
    • IPFire
    • Juniper
    • Mikrotik
    • Noction Flow Analyzer
    • OpenSwitch
    • Openvswitch
    • Pfsense
    • Titanium
    • vIOS
    • VyOS
  • Scripting
    • Scapy
  • Virtualization
    • Qemu
    • VirtualBox
    • VMware

Category: Security

  • Home
  • Security
  • Page 2
  • Security

Cracking WPA/WPA2 Pre-shared Key Using GPU

  • Radovan Brezula
  • July 1, 2021

The WPA/WPA2 4-way authentication handshake between AP (authenticator) and client (supplicant) is used to generate […]

  • Security

Cracking WPA/WPA2 Pre-shared Key

  • Radovan Brezula
  • March 1, 2021

This tutorial illustrates cracking of pre-shared key which is needed to gain an access to […]

  • Security

Cuckoo Installation and Configuration on Debian 10 Buster

  • Radovan Brezula
  • January 11, 2020

The tutorial covers installation and configuration of Cuckoo Malware Sandbox on Debian 10 Buster. Once […]

  • Security

How to Configure BurpSuite to use Tor as Proxy

  • Radovan Brezula
  • January 2, 2020

BurpSuite is a manual toolkit for investigating web security. Burp Proxy allows manual testers to […]

  • Security

Reverese Shell on Linux

  • Radovan Brezula
  • November 19, 2016

Reverse shell is technique when a client connects to a server and the client provides its […]

  • Security

GRE over IPSec Tunnel and NAT Between Cisco and VyOS

  • Radovan Brezula
  • October 31, 2016

The goal of this tutorial is to provide a configuration for Cisco and VyOS network […]

  • Security

BASH Script for Dictionary Attack Against SSH Server

  • Radovan Brezula
  • January 11, 2016

Although they are several dictionary password attack tools available for Linux such as Hydra, Ncrack, […]

  • Security

Collecting MAC and IP Adresses of Hosts Connected to Cisco Switches Using SNMP

  • Radovan Brezula
  • November 29, 2015

The goal of this article is to introduce a script that automates a process of […]

  • Security

GRE over IPSec Tunnel Between Cisco and VyOS

  • Radovan Brezula
  • October 6, 2015

The previous tutorial shown GRE tunnel configuration between Cisco router and Linux Core. The big advantage […]

  • Security

Public Key Authentication on Cisco IOS

  • Radovan Brezula
  • May 13, 2015

Have you ever been in that situation that you needed to apply the same configuration […]

Posts navigation

Older posts
Newer posts

Pages

  • Home
BGP
Intelligent Routing Platform

BGP management
Automated BGP Network Management

What is NetFlow?

NetFlow
NetFlow vs. sFlow vs. IPFIX vs. NetStream. Network Traffic Analysis and Monitoring.

BGP Security: BGPsec Protocol

BGP protocol
BGPsec is an integral part of the BGP protocol, and thus, BGP routers must do the…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 312 other subscribers

Categories

Top Posts & Pages

  • Enterprise Network on GNS3 - Part 1 - Introduction
  • VyControl - Web UI for VyOS Firewall
  • Dell Optiplex 7050 SFF Upgrade for Proxmox
  • Configuring the Cisco Aironet AP 1142
  • Cisco Dynamic Trunk Protocol Hacking with Scapy
  • BGP on Cisco IOS XRv - Prefix-Sets and Route-Policies
  • Cisco TRex on Ubuntu Server 18.04
  • Booting Raspberry Pi 3 B from USB Drive
  • MikroTik RouterOS Advanced Configuration
  • OPENVSWITCH - Playing with Bonding on Openvswitch
Copyright © 2025 Brezular's Blog