Cisco Blogs
Share
tweet

Protecting the Internet Edge

- June 5, 2009 - 0 Comments

Jimmy Ray hosted one of his ‘white hat hacking master classes’ as one viewer termed it. Massive response yesterday to a great webex based security chat complete with video and application sharing. Record numbers registered and showed up. Here are some notes and helpful links that were asked for. The full replay of the event is available here: (COMING SOON)imageNotes and helpful links:imageimageimageimageimageimageBlog entries on two of the tools covered:Yersinia (layer 2 hacking)The USB hackRan out of time on this one – The tool name is switchblade BUT the method is called GonZor. Take a read on this blog he posted recently “Roll Your Own Hack Tools“: on how to install and use this very powerful tool set.Documented Special Use Addresses: 0.0.0.0/8 “This” Network [RFC1700, page 4] 10.0.0.0/8 Private-Use Networks [RFC1918] 14.0.0.0/8 Public-Data Networks [RFC1700, page 181] 24.0.0.0/8 Cable Television Networks — 39.0.0.0/8 Reserved but subject to allocation [RFC1797] 127.0.0.0/8 Loopback [RFC1700, page 5] 128.0.0.0/16 Reserved but subject to allocation — 169.254.0.0/16 Link Local — 172.16.0.0/12 Private-Use Networks [RFC1918] 191.255.0.0/16 Reserved but subject to allocation — 192.0.0.0/24 Reserved but subject to allocation — 192.0.2.0/24 Test-Net 192.88.99.0/24 6to4 Relay Anycast [RFC3068] 192.168.0.0/16 Private-Use Networks [RFC1918] 198.18.0.0/15 Network Interconnect Device Benchmark Testing [RFC2544] 223.255.255.0/24 Reserved but subject to allocation — 224.0.0.0/4 Multicast [RFC3171] 240.0.0.0/4 Reserved for Future Use [RFC1700, page 4]

Leave a comment

We'd love to hear from you! To earn points and badges for participating in the conversation, join Cisco Social Rewards. Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed.

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.

Share
tweet