Cisco Blogs


Cisco Blog > Cisco Interaction Network

Protecting the Internet Edge

June 5, 2009
at 12:00 pm PST

Jimmy Ray hosted one of his ‘white hat hacking master classes’ as one viewer termed it. Massive response yesterday to a great webex based security chat complete with video and application sharing. Record numbers registered and showed up. Here are some notes and helpful links that were asked for. The full replay of the event is available here: (COMING SOON)imageNotes and helpful links:imageimageimageimageimageimageBlog entries on two of the tools covered:Yersinia (layer 2 hacking)The USB hackRan out of time on this one -- The tool name is switchblade BUT the method is called GonZor. Take a read on this blog he posted recently “Roll Your Own Hack Tools“: on how to install and use this very powerful tool set.Documented Special Use Addresses: 0.0.0.0/8 “This” Network [RFC1700, page 4] 10.0.0.0/8 Private-Use Networks [RFC1918] 14.0.0.0/8 Public-Data Networks [RFC1700, page 181] 24.0.0.0/8 Cable Television Networks — 39.0.0.0/8 Reserved but subject to allocation [RFC1797] 127.0.0.0/8 Loopback [RFC1700, page 5] 128.0.0.0/16 Reserved but subject to allocation — 169.254.0.0/16 Link Local — 172.16.0.0/12 Private-Use Networks [RFC1918] 191.255.0.0/16 Reserved but subject to allocation — 192.0.0.0/24 Reserved but subject to allocation — 192.0.2.0/24 Test-Net 192.88.99.0/24 6to4 Relay Anycast [RFC3068] 192.168.0.0/16 Private-Use Networks [RFC1918] 198.18.0.0/15 Network Interconnect Device Benchmark Testing [RFC2544] 223.255.255.0/24 Reserved but subject to allocation — 224.0.0.0/4 Multicast [RFC3171] 240.0.0.0/4 Reserved for Future Use [RFC1700, page 4]

Comments Are Closed