Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
networking [2008/02/25 09:50]
193.164.137.40
networking [2012/01/17 21:51] (current)
greebo old revision restored
Line 2: Line 2:
 <html><div float=right></html> <html><div float=right></html>
 <box 60% round orange right|**Networking links else where**> <box 60% round orange right|**Networking links else where**>
 +  * **[[http://netalyzr.icsi.berkeley.edu/index.html|Debug your Internet - The ICSI Netalyzr Beta]]**
   * [[http://dsd.lbl.gov/TCP-tuning/|TCP Tuning guide]]   * [[http://dsd.lbl.gov/TCP-tuning/|TCP Tuning guide]]
   * [[http://www.speedguide.net/sg_tools.php| Speed guides and tools]]   * [[http://www.speedguide.net/sg_tools.php| Speed guides and tools]]
Line 10: Line 11:
  
   * [[http://www.kfu.com/~nsayer/6to4/|Public IPv6 2 IPv4 relay routers]]   * [[http://www.kfu.com/~nsayer/6to4/|Public IPv6 2 IPv4 relay routers]]
 +  * [[http://www.academ.com/nanog/feb1997/multihoming.html|Non-BGP Multihoming for Web Hosts]]
  
 </box> </box>
 +
 +<box 60% round red right|**RFC and other stuff on need to know basis**>
 +   * [[http://tools.ietf.org/html/rfc5375|IPv6 Unicast Address Assignment Considerations]]
 +   * [[http://tools.ietf.org/html/rfc1930|Guidelines for creation, selection, and registration of an Autonomous System (AS)]]
 +</box>
 +
 <html></div></html> <html></div></html>
 +
  
 **New articles in this section:** **New articles in this section:**
Line 19: Line 28:
 |[[ipsec:swan-cisco|*swan & Cisco]]|Some tips with *swan projects and Cisco| |[[ipsec:swan-cisco|*swan & Cisco]]|Some tips with *swan projects and Cisco|
 |[[linux:networking|Linux networking]]|stuff that you can do in network with linux| |[[linux:networking|Linux networking]]|stuff that you can do in network with linux|
 +
 +
  
  
Line 25: Line 36:
 ^ filename ^ description ^ ^ filename ^ description ^
 |{{:config_guide.pdf|config_guide.pdf}}|AMS-IX Port Configuration Hints 1.24 (mirror) ([[http://www.ams-ix.net/technical/config_guide/|original]]) | |{{:config_guide.pdf|config_guide.pdf}}|AMS-IX Port Configuration Hints 1.24 (mirror) ([[http://www.ams-ix.net/technical/config_guide/|original]]) |
 +
 +
 +<note tip>
 +**MTU diferences between JUNIPER and CISCO** - Cisco includes ip and icmp header size in the total specified packet size. Payload in the case is 1510-20-8 = 1482 bytes. Juniper adds icmp and ip header to the payload size you specify. So 1510 becomes 1538 bytes of ip packet.
 +</note>
  
 **Useful tools** **Useful tools**
Line 31: Line 47:
 | **[[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|PuTTY]]** | Windows SSH Client - [[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe| download - latest x86]]| | **[[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|PuTTY]]** | Windows SSH Client - [[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe| download - latest x86]]|
 | **[[http://puttycm.free.fr/|PuTTY Connection Manager]]** | PuTTY Connection Manager is a free PuTTY Client add-on for Windows platforms which goal is to provide a solution for managing multiple PuTTY instances in tabs. | | **[[http://puttycm.free.fr/|PuTTY Connection Manager]]** | PuTTY Connection Manager is a free PuTTY Client add-on for Windows platforms which goal is to provide a solution for managing multiple PuTTY instances in tabs. |
-| **[[http://voiphopper.sourceforge.net/|VoIP hopper]]**  | VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches.  VoIP Hopper does this by mimicking the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments.  |+| **[[http://voiphopper.sourceforge.net/|VoIP hopper]]**  | VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches.  VoIP Hopper does this by mimicking the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments. 
 | **[[http://segfault.gr/projects/lang/en/projects_id/14/secid/28/|CDPSnarf]]** | CDPSnarf if a network sniffer exclusively written to extract information from CDP packets. It provides all the information a "show cdp neighbors detail" command would return on a Cisco router and even more. | | **[[http://segfault.gr/projects/lang/en/projects_id/14/secid/28/|CDPSnarf]]** | CDPSnarf if a network sniffer exclusively written to extract information from CDP packets. It provides all the information a "show cdp neighbors detail" command would return on a Cisco router and even more. |
 +| **[[http://ucsniff.sourceforge.net/|UCSniff]]** | - is a nice tool developped as a PoC to demonstrate the risks of VoIP. It can be used to conduct audits or penetration tests on VoIP networks. --> more here: http://ucsniff.sourceforge.net/usage.html |
 | **[[http://w3.antd.nist.gov/tools/nistnet/index.html|NIST Net]]** | NIST Net is a network emulation package that runs on Linux. NIST Net allows a single Linux PC set up as a router to emulate a wide variety of network conditions. | | **[[http://w3.antd.nist.gov/tools/nistnet/index.html|NIST Net]]** | NIST Net is a network emulation package that runs on Linux. NIST Net allows a single Linux PC set up as a router to emulate a wide variety of network conditions. |
 +| **[[http://code.google.com/p/dnsenum/|DNSenum - Domain Information Gathering Tool]]**|The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain.| 
 +| **[[http://lcamtuf.coredump.cx/p0f.tgz|P0f v2]]** | P0f v2 is a 100% passive OS fingerprinter capable of identifying parties during casual communication, detecting NATs, connection sharing, etc. P0f is included with many distros, integrated into OpenBSD, amavisd, milter, and so on. Some of the articles on P0f: "Nmap's Silent Partner", "Dynamic Honeypots". | 
 +| **[[http://midnightresearch.com/local/packages/depant/depant-0.1a.tgz|Depant]]** | MRL has a new tool we’re releasing that will check your network for services with default passwords. The tool is called depant ((DE)fault (PA)ssword (N)etwork (T)ool).  more on: http://midnightresearch.com/pages/depant-your-network/
 +| **[[http://freeworld.thc.org/thc-hydra/|THC-Hydra]]** | A very fast network logon cracker which support many different services| 
 +| **[[http://www.nta-monitor.com/tools/ike-scan/|ike-scan]]** | ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPsec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license. | 
 +| **[[http://tcpick.sourceforge.net/index.php|Tcpick Tcp Stream Sniffer and Connection Tracker]]** | tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams. Tcpick is able to save the captured flows in different files or displays them in the terminal, and so it is useful to sniff files that are transmitted via ftp or http. It can display all the stream on the terminal, when the connection is closed in different display modes like hexdump, hexdump + ascii, only printable charachters, raw mode and so on. Available a color mode too, helpful to read and understand better the output of the program. Actually it can handle several interfaces, including ethernet cards and ppp. It is useful to keep track of what users of a network are doing, and is usable with textmode tools like grep, sed, awk. | 
 +| **[[http://www.brendangregg.com/chaosreader.html|Chaosreader]]** | A open source tool to trace TCP/UDP/... sessions and fetch application data from snoop or tcpdump logs. This is a type of "any-snarf" program, as it will fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG, ...), SMTP emails, ... from the captured data inside network traffic logs. A html index file is created that links to all the session details, including realtime replay programs for telnet, rlogin, IRC, X11 or VNC sessions; and reports such as image reports and HTTP GET/POST content reports. Chaosreader can also run in standalone mode - where it invokes tcpdump or snoop (if they are available) to create the log files and then processes them. |
  
  
Line 40: Line 63:
   * [[http://video.google.com/videoplay?docid=-3750938102931445233|LISP protocol]]   * [[http://video.google.com/videoplay?docid=-3750938102931445233|LISP protocol]]
   * [[http://www.apnic.net/news/hot-topics/docs/bgp-movie.mpg|IP/AS# consumption]]   * [[http://www.apnic.net/news/hot-topics/docs/bgp-movie.mpg|IP/AS# consumption]]
 +
 +===== RIPE =====
 +  * [[ripe]]
networking.1203929444.txt.gz · Last modified: 2009/05/25 00:34 (external edit)
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0 ipv6 ready