Page 7 - December_Newsletter_2023
P. 7
3. Enter tracert, a space, then the IP address or web address for the destination site (for example: tracert
www.lexis.com).
4. Press Enter.
Running a Traceroute on Linux
1. Type “traceroute” followed by the hostname or IP address you'd like to trace.
2. Wait for the trace to complete and review the results.
And there is more – Port Mirroring.
Port mirroring is a method of copying and sending network packets transmitted as input from a port to another
port of a monitoring computer/switch/device. It is a network monitoring technique implemented on network
switches and similar devices.
Port mirroring is implemented in local area networks (LAN), wireless local area networks (WLAN) or virtual
local area networks (VLAN) to identify, monitor and troubleshoot network abnormalities. It is configured at
the network switch by a network administrator (NA) or network monitoring/security application. When ena-
bled, the traffic that emerges to and from a specific port number is automatically copied and transmitted to a
monitoring/destination port. Typically, the destination port is part of the monitoring software or security ap-
plication that analyses these data packets.
The port mirroring process is generally hidden from the source and other nodes on the network.
A man-in-the-middle (MITM) attack is a cyber-attack in which a threat actor puts themselves in the middle of
two parties, typically a user and an application, to intercept their communications and data exchanges and use
them for malicious purposes like making unauthorized purchases or hacking.
VPNs can be used to create a secure environment for sensitive information within a local area network. They
use key-based encryption to create a subnet for secure communication. This way, even if an attacker happens
to get on a network that is shared, he will not be able to decipher the traffic in the VPN.