One of the first things both attackers and defenders do is to reconnoiter the network that they are attacking or defending. “Time spent on reconnaissance is seldom wasted.” – Duke of Wellington Arthur Wellesley. This is true in cybersecurity just like war. We must know what we’re defending if we have any hope of defending it.
The Problem Recently at work, we had an issue where one of our guest networks wasn’t allowing new hosts onto the network. After some investigation, it appeared that we had simply run out of available IP addresses in the DHCP pool. We added 100 addresses and thought we were done until we noticed that within […]
Security has always been an important component in being a Network Engineer. Today’s Internet of Things (IoT) and the growing number of cyber attacks has made it even more crucial. Because of this, I’ve decided to go back into the Security realm of certification coursework and exams. It has been over a decade since I […]
Happy New Year! Welcome to my new bit of territory on the Internet. For those who found it via my old blog, welcome back. For the new readers, welcome and I hope you find something useful. Pack IT Forwarding will be a place where I can share my experiences in the IT world. My hope […]