6 Questions 5 Answers 0 Followers
Questions related from Nikhil Tripathi
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point. Can it be done in case of WPA2 encrypted networks too, i mean the complete four way...
08 April 2015 9,696 3 View
According to cisco enterprise mobility, it is stated that "Even if port security is not an option to stop MAC flooding in wireless networks, the MAC flooding attack is unsuccessful when launched...
12 March 2015 7,049 6 View
While capturing DHCPDISCOVER messages, I found out that some of them are sending these using an IP address. The snapshot for the same is attached:
28 January 2015 9,163 7 View
I have time period values on the X-axis and the probability of an event occurring at a particular time on the Y-axis.
28 January 2015 6,321 3 View
While poisoning an ARP cache, it is the legitimate user whose reply is received first rather than the attacker's fake reply when a corresponding request is sent. Maybe because the attacker is...
28 February 2014 1,839 14 View
I was scanning my network IPs. I found out that two different IP addresses were bound to the same MAC address. When I sent the ICMP echo requests to them, both of them responds back with echo reply.
23 January 2014 9,529 11 View