Sniffing traffic is relatively easy enough. You just fire Wireshark up and look at the packets. Intercepting traffic and modifying it in real time is something that caught my attention, especially from an average user perspective. When you cannot trust users on your network of properly handling data in relation with filesharing services/cloud services, or you just want an easy way for them to upload encrypted data instead of plain-text, modifying their traffic on the fly is the way to go. Continue reading “Intercepting and modifying HTTP uploads”
Last week I had the opportunity to join the 2014 edition of the LEGO IT Summer Camp. The topic for this year was Enterprise Security. We were 15 students from around Denmark specialised in computer science/IT engineering and communication and organisation. You can see the description in the official Summer Camp poster. Continue reading “LEGO IT Summer Camp”
I was checking the logs on my Asus RT-N16 running OpenWRT and i had this one repeting itself continously:
Thu Jul 3 18:54:52 2014 daemon.warn dnsmasq-dhcp: DHCP packet received on eth0.2 which has no address
I’m running a PPPoE internet connection on my router, and others doing so faced the similar problem.
The solution is in the file that handles configuration for both DNS and DHCP on OpenWRT, which is located in /etc/dnsmasq.conf
The quick fix for this is to exclude your interface which the PPPoE line is connected to, from DHCP requests. This can be done by opening the file and adding the following line:
Or directly using echo:
echo “except-interface=eth0.2” >> /etc/dnsmasq.conf
Replace “eth0.2” with the interface that is popping in the logs.
Two summers ago i decided to roll out my first summer project for my home, which was a TP-Link TL-WR740N running OpenWRT with some small addons, such as dinamic DNS and wake-on-lan. This summer i decided that i should extend and improve my network a bit. Continue reading “Extending and improving my home network”