About Me

Hello, I’m In-Jun, exploring the field of DevOps.

Learning ARP Spoofing Through Theory and Practice

Introduction ARP spoofing is an attack technique that has been studied in the network security field for a long time. This attack aims to intercept or modify network traffic by exploiting the structural limitations of the ARP protocol. In this article, we will systematically cover the basic concepts of the ARP protocol, the operational principles of ARP spoofing, actual attack implementation, and methods to defend against it. What is the ARP Protocol? ARP (Address Resolution Protocol) is a protocol responsible for address translation between the network layer (IP) and the data link layer (MAC). Simply put, to communicate on an IP network, you need to know not only the target’s IP address but also its MAC address. This is where ARP comes in. ...

April 28, 2025 · 5 min · 1057 words · In-Jun Hwang

How to Change MAC Address in Ubuntu

Introduction MAC address (Media Access Control address) is a unique identifier for network devices. For security or privacy reasons, you may need to change this address. In this post, we will explore how to change MAC address in Ubuntu. What is a MAC Address? MAC address is a unique identifier assigned to a Network Interface Card (NIC). This 48-bit (6-byte) address is typically displayed in hexadecimal format as XX:XX:XX:XX:XX:XX. The structure of the address is as follows: ...

April 27, 2025 · 2 min · 384 words · In-Jun Hwang

Understanding Reverse Shells

Introduction A reverse shell is a remote shell technique that operates in the opposite direction of normal connections. The target system attempts to connect to the attacker’s system, enabling remote command execution. It’s particularly useful in firewall and NAT environments, as most firewalls block incoming connections but allow outgoing ones. How It Works The basic flow of a reverse shell works as follows: The attacker sets up a listener on their system to receive connections on a specific port Code executed on the target system attempts to connect to the attacker’s system The input and output of the target system are forwarded to the attacker The attacker can execute commands on the target system and view the results While typical remote access involves ’the attacker connecting to the target system’, a reverse shell uses the approach of ‘making the target system connect to the attacker’. This reverse connection is the key to bypassing firewalls. ...

April 27, 2025 · 6 min · 1197 words · In-Jun Hwang

Understanding IPv6 Neighbor Discovery Protocol (NDP)

Overview In IPv6 networks, Neighbor Discovery Protocol (NDP) is a core protocol that manages interactions between network devices. It integrates several IPv4 protocol functions such as ARP and ICMP Router Discovery, enabling more efficient network management. Key Features Multicast-based communication reduces network load Automated address configuration improves management efficiency Enhanced security features support secure network operations 1. Core Functions of Neighbor Discovery Neighbor Node Discovery Automatically finds and verifies MAC addresses of other devices in IPv6 networks. This completely replaces ARP functionality from IPv4. ...

February 24, 2025 · 3 min · 555 words · In-Jun Hwang

How to Install Wine on Ubuntu 24.04 LTS

What is Wine? Wine (Wine Is Not an Emulator) lets you run Windows programs on Linux systems like Ubuntu 24.04 LTS. Rather than being a typical emulator, Wine works by translating Windows commands directly into ones your Linux system can understand. This means better performance than you’d get with traditional virtualization. Main Benefits Runs without a virtual machine, keeping things fast and simple Plays your favorite Windows games through DirectX support Works with everyday Windows software like Microsoft Office 1. Getting Your System Ready Let’s start by updating your system: ...

February 23, 2025 · 2 min · 255 words · In-Jun Hwang