![]() We’ll assume you’re familiar with some networking basics, like how to find your router’s list of devices and what a MAC address is. In short: You’ll be able to recognise the signs that something on your network is compromised. In this post, we’ll show you how to map out your network, take a peek under the covers to see who’s talking to what, and how to uncover devices or processes that may be sucking up bandwidth. Additional images by Thomas van de Weerd and Linux Screenshots. Title photo made using Christos Georghiou. Let’s talk about how you can, with the power of evil, sniff around your home network to make sure you don’t have any uninvited guests. Inside it lies tons of valuable information - unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |