Laura Kaplan Never Give Up, Never Surrender

2018 Personal Update

Yikes 2018 has been a crazy year! I have somehow managed to squeeze in a new job, new husband, new house, completing my Master’s and passing the CISSP all in the last few months. With all of this crazy going on, this blog has unfortunately been left to collect dust. Honestly, I haven’t even had the time to get my lab set up since the move! Fortunately, things should be...
READ MORE

Practical Packet Analysis

I’ve taken two networking classes (one at the undergrad level and one at the graduate level) and both left me feeling like I had just wasted a semester of my life. Arguably, this is partially due to the quality of the instructors, but both classes suffered from a common failing in academia: not teaching anything practical or tangible to go with the conceptual. This book covers a good chunk of...
READ MORE

Scanning with Traceroute

Traceroute is a tool most network and system administrators are familiar with and comes installed on most operating systems by default. Traceroute allows you to follow the path a packet takes through a network, identify any routers or other devices along that packet’s path, and determine the network latency between devices on that path. These capabilities are obviously pretty handy for debugging a network. However, from an attacker’s perspective this...
READ MORE

Packet Sniffing with Python

As part of my efforts to write my own packet sniffer, I wanted to take a look at handling raw packet data. I am hoping to eventually evolve this script into a tool to actually modify packet data before it is sent out. Fortunately, the Internet is vast and I found some great tutorials and example scripts to help me on my way. This post documents the steps I used...
READ MORE

Information Gathering with DNS

The information gathering phase of an attack is often overlooked when first learning about how to attack a device. It simply isn’t as sexy as learning about all the fun exploits you can do once you’ve identified a vulnerable system. However, this phase is usually the most critical part of an adversary’s strategy. If you don’t understand your target, how do you know what to attack and how? Of the...
READ MORE