Preventing SSH Known Hosts Enabled Island Hopping

Upon connecting to an OpenSSH server, the server sends its public key to the client so that the user on the client side can verify that the server they are trying to connect to is indeed the server they expect it to be (and not an attacker spoofing the desired SSH server). Once initially verified, […]

Creating VLANs Using Cisco IOS

VLANs can easily be implemented on Cisco switches to improve network layout as well as security and efficiency. With VLANs we are able to, with software, logically separate ports on a switch (or other network device) into discrete groups that function as their own independent LANs. For example, let’s say we are designing a network […]

Protecting Against SSH Server Spoofing

To defend against SSH server spoofing – where an attacker sets up an SSH server and masquerades as another in order to capture users’ login credentials – every SSH server has a unique public key that can be utilized to verify that servers identity. This key is located in the /etc/ssh/ directory, and is used […]