Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.
$ sudo airodump-ng wlp3s0
Picture 1 - Wireless Networks of Caffe Geo Guru
The following three ESSIDs have caught my attention.
1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib
In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.
Note: The first two ESSID are written in Slovak. Their English version is below.
1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib
The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading
Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.
$ sudo airodump-ng wlp3s0
Picture 1 - Wireless Networks of Caffe Geo Guru
The following three ESSIDs have caught my attention.
1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib
In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.
Note: The first two ESSID are written in Slovak. Their English version is below.
1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib
The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading
Short-term subscription financing has been available for networking software, but it’s more rare for networking hardware.
The platform integrates with public and private cloud providers, and allows DevOps teams to deploy applications in minutes.
CA Technologies says containers are “no-brainers” because they improve flexibility and increase developer productivity.
Configuring a static route is just like installing an entry directly in the routing table (or the RIB).
I have been told this many times in my work as a network engineer by operations people, coders, designers, and many other folks. The problem is that it is, in some routing table implementations, too true. To understand, it is best to take a short tour through how a typical RIB interacts with a routing protocol. Assume BGP, or IS-IS, learns about a new route that needs to be installed in the RIB:
The last step results in one of two possible reactions. The first Continue reading
The Internet Society Pakistan Islamabad Chapter (PK IBD) organised a webinar on “Digital Empowerment of Women in South Asia” on 15 March, 2018. ISOC Chapter leaders, members, and staff participated in the webinar where the regional and global women-centric initiatives were shared by the speakers.
The undersigned welcomed the audience on behalf of the Internet Society Pakistan Islamabad Chapter followed by a round of introductions. Joyce Dogniez, the Internet Society’s Senior Director, Global Community Engagement, shared the importance and relevance of the UN-EQUALS partnership which is a unique collaboration between state and non-state actors to bridge the digital gender divide. Joyce shared that the Internet Society is an important part of this partnership that primarily emphasizes improving ICT access, imparting digital skills, and promoting leadership of women. Internet and digital literacy leads to economic empowerment of women that can have a profound community impact.
The next session featured updates from the Chapter Leaders of South Asia on the various initiatives being undertaken on the country and Chapter level. Sagarika Wickramasekera from the ISOC Sri Lanka Chapter informed about the initiatives of the Chapter including WomenIGF, IT trainings for girls at school level, Internet learning programmes for women entrepreneurship, etc. Sidra Jalil from Continue reading
After completing its merger with Elfiq Networks, Martello launched an SD-WAN and is putting its scalability to the test with Canada’s Center of Excellence in Next-Generation Networks.
Containers can help enterprises maximize their cloud infrastructure if deployed correctly or cause headaches if treated like more traditional VM infrastructure.
Take a Network Break! Cisco announced that it would allow third-party OSs to run on Nexus 9200 and 9300 switches, and let customers run NX-OS on other hardware. The company is also making its IOS-XR router OS available for “curated” third-party hardware.
AT&T announces a plan to deploy 60,000 whitebox routers as part of its 5G rollout, and its dNOS open network OS moves to the Linux Foundation. Juniper’s OpenContrail also joins the Linux Foundation and gets renamed Tungsten Fabric.
The P4 network programming language becomes an official project of the Open Networking Foundation, HPE buys Cape Networks for WLAN performance monitoring, Microsoft reorganizes the company, and Arista announces new 25 and 100GbE switches.
Get links with more details to all these stories after our sponsor message.
Send files to the cloud quickly and easily with Couchdrop, a cloud-based service that uses the Secure Copy Protocol to transfer files. Couchdrop integrates with Dropbox, GoogleDrive, Amazon S3 buckets and more. Head to Couchdrop.io to get details, and get two months free with a one-year subscription.
An Architectural Approach to Flexible Consumption for Service Providers with IOS XR – Cisco
Enabling IOS-XR on Third-Party Network Hardware Continue reading
Do you believe ICANN should go ahead with the plan to roll the Root Key Signing Key (KSK) on 11 October 2018? If so (or if not), the deadline for public comment is TODAY, 2 April 2018, at 23:59 UTC. That’s about 9.5 hours from the time I’m publishing this post.
My colleague Kevin Meynell provided more info about this public comment process when it began in March. At the IETF 101 meeting in London, I spoke with ICANN staff who again stated that they would like to hear from many voices about whether they should go ahead with the Root KSK Rollover on 11 October 2018. It’s very simple to send in comments:
You can see the current list of comments at: https://mm.icann.org/pipermail/comments-ksk-rollover-restart-01feb18/2018q1/thread.html (All comments are public.)
I would encourage anyone interested to submit comments (even if they are simply “I support the plan.”).
And if you have want more information about how to get started with using DNSSEC, please see our Deploy360 Start page to begin.
Image credit: Bryce Barker on Unsplash
The post Deadline TODAY (23:59 UTC) to submit comments to ICANN Continue reading
I'm positive on Juniper Contrail, but there are many things to think about regarding the company's SDN strategy and the changing market.
What IoT security problem? Most IT professionals realize the Internet of things poses some security risks, but less than a third of them actively monitor for third-party IoT security problems, according to a survey detailed at ZDNet. More than a third of those surveyed said that nobody in their organization is responsible for reviewing the risk-management policies of their IoT vendors.
Some security risks, only faster: Meanwhile, the European Union Agency for Network and Information Security is warning organizations that 5G mobile service may bring the same security risks as earlier mobile standards have. Known flaws in SS7 and Diameter, the signaling protocols used in 2G, 3G, and 4G, could end up in 5G, and allow traffic to be eavesdropped or spoofed, reports ARN.
Community broadband for net neutrality: The American Civil Liberties Union is urging U.S. cities to build their own broadband networks as a way to protect net neutrality principles, now that the Federal Communications Commission has repealed its related regulations. The Hill has a story. Many small U.S. cities are already building their own, in an effort to provide faster or cheaper service than commercial providers, Governing Magazine says.
Fake news in the news: Malaysia Continue reading
For networking pros, subnetting is an essential skill. Follow these steps to ensure reliable performance and security in IPv4 networks.
For networking pros, subnetting is an essential skill. Follow these steps to ensure reliable performance and security in IPv4 networks.