| Ko

Learning ARP Spoofing Through Theory and Practice

Introduction ARP spoofing is an attack technique that has been studied in the network security field for a long time. This attack aims to intercept or modify network traffic by exploiting the structural limitations of the ARP protocol. In this article, we will systematically cover the basic concepts of the ARP protocol, the operational principles of ARP spoofing, actual attack implementation, and methods to defend against it. What is the ARP Protocol? ARP (Address Resolution Protocol) is a protocol responsible for address translation between the network layer (IP) and the data link layer (MAC). Simply put, to communicate on an IP network, you need to know not only the target’s IP address but also its MAC address. This is where ARP comes in. ...

April 28, 2025 · 5 min · 1043 words · In-Jun

How to Change MAC Address in Ubuntu

Introduction MAC address (Media Access Control address) is a unique identifier for network devices. For security or privacy reasons, you may need to change this address. In this post, we will explore how to change MAC address in Ubuntu. What is a MAC Address? MAC address is a unique identifier assigned to a Network Interface Card (NIC). This 48-bit (6-byte) address is typically displayed in hexadecimal format as XX:XX:XX:XX:XX:XX. The structure of the address is as follows: ...

April 27, 2025 · 2 min · 376 words · In-Jun

Homelab #6 - Secret Management with Vault

Overview In the previous post, we installed the Traefik ingress controller on our homelab Kubernetes cluster and configured external access. This post covers installing and configuring HashiCorp Vault for securely managing sensitive information (passwords, API keys, certificates, etc.) in the Kubernetes cluster. Why Default Kubernetes Secrets Were Insufficient Secret management proved challenging while building the homelab environment using the GitOps approach. Several limitations became clear when using default Kubernetes Secrets. ...

February 26, 2025 · 11 min · 2162 words · In-Jun

Linux chmod Demystified

Understanding Linux Permissions Linux, adhering to UNIX heritage, possesses a robust file permission system. Every file and directory can have specific read, write, and execute permissions for its owner, group, and other users. This mechanism facilitates security and resource sharing in multi-user systems. Composition of Basic Permissions Linux permissions consist of three basic elements: read (r), write (w), and execute (x). These permissions can be set independently for the owner, group, and others. Notations like -rwxr-xr– seen while listing files represent combinations of such permissions. ...

February 17, 2025 · 3 min · 567 words · In-Jun
[email protected]