

{"id":3871,"date":"2016-01-07T11:08:28","date_gmt":"2016-01-07T16:08:28","guid":{"rendered":"http:\/\/rud.is\/b\/?p=3871"},"modified":"2018-03-07T16:43:07","modified_gmt":"2018-03-07T21:43:07","slug":"paths-to-discovery-how-to-keep-tabs-on-your-home-network","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","title":{"rendered":"Paths To Discovery: Mapping Your Home Network"},"content":{"rendered":"<p>Gone are the days when one had a single computer plugged directly into a modem (cable, DSL or good ol&#8217; Hayes). Even the days when there were just one or two computers connected via wires or invisible multi-gigahertz waves passing through the air are in the long gone by. Today (as you&#8217;ll see in the February 2016 [OUCH! newsletter](http:\/\/securingthehuman.sans.org\/resources\/newsletters\/ouch\/2016)), there are scads of devices of all kinds on your home network. How can you keep track of them all?<\/p>\n<p>Some router &#038; wireless access point vendors provide tools on their device &#8220;admin&#8221; pages to see what&#8217;s connected, but they are inconsistent at best (and usually pretty ugly &#038; cumbersome to navigate to). Thankfully, app purveyors have jumped in to fill the gap. Here&#8217;s a list of free or &#8220;freemium&#8221; (basic features for free, advanced features cost extra) tools for mobile devices and Windows or OS X (if you&#8217;re running Linux at home, I&#8217;m assuming you&#8217;re familiar with the tools available for Linux).<\/p>\n<p>### iOS<\/p>\n<p>&#8211; Fing &#8211; <https:\/\/itunes.apple.com\/app\/id430921107><br \/>\n&#8211; iNet &#8211; Network Scanner &#8211; <https:\/\/itunes.apple.com\/us\/app\/inet-network-scanner\/id340793353?mt=8><br \/>\n&#8211; Network Analyzer Lite &#8211; wifi scanner, ping &#038; net info &#8211; <https:\/\/itunes.apple.com\/us\/app\/network-analyzer-lite-wifi\/id562315041?mt=8><\/p>\n<p>### Android<\/p>\n<p>&#8211; Fing &#8211; <https:\/\/play.google.com\/store\/apps\/details?id=com.overlook.android.fing&#038;hl=en> (google); <http:\/\/www.amazon.com\/Overlook-Fing-Network-Tools\/dp\/B005VT42BS\/ref=sr_1_1?ie=UTF8&#038;qid=1330770639&#038;sr=8-1> (amazon)<br \/>\n&#8211; Pamn <https:\/\/play.google.com\/store\/apps\/details?id=com.wjholden.nmap&#038;hl=en> (google); <https:\/\/github.com\/wjholden\/PIPS> (direct source)<\/p>\n<p>### Windows<\/p>\n<p>&#8211; Advanced IP Scanner <http:\/\/www.advanced-ip-scanner.com\/><br \/>\n&#8211; Angry IP Scanner &#8211; <http:\/\/angryip.org\/download><br \/>\n&#8211; Fing &#8211; <http:\/\/www.overlooksoft.com\/fing><br \/>\n&#8211; MiTec Network Scanner &#8211; <http:\/\/www.mitec.cz\/netscan.html><br \/>\n&#8211; nmap &#8211; <https:\/\/nmap.org\/><\/p>\n<p>### OS X<\/p>\n<p>&#8211; Angry IP Scanner &#8211; <http:\/\/angryip.org\/download><br \/>\n&#8211; Fing &#8211; <http:\/\/www.overlooksoft.com\/fing><br \/>\n&#8211; IP Scanner &#8211; <https:\/\/itunes.apple.com\/us\/app\/ip-scanner\/id404167149?mt=12><br \/>\n&#8211; LanScan &#8211; <https:\/\/itunes.apple.com\/us\/app\/lanscan\/id472226235?mt=12><br \/>\n&#8211; nmap &#8211; <https:\/\/nmap.org\/><\/p>\n<p>Some of these tools are easier to work with than others, but they all install pretty easily (though &#8220;Fing&#8221; and &#8220;nmap&#8221; work at the command-line on Windows &#038; OS X, so if you&#8217;re not a &#8220;power user&#8221;, you may want to use other tools on those platforms). In most cases, it&#8217;s up to you to keep a copy of the output and perform your own &#8220;diffs&#8221;. One &#8220;pro&#8221; option for tools like &#8220;Fing&#8221; is the ability to have the tool store scan results &#8220;in the cloud&#8221; and perform this comparison for you.<\/p>\n<p>Drop a note in the comments if you have other suggestions, but _vendors be warned_: I&#8217;ll be moderating all comments to help ensure no evil links or blatant product shilling makes it to reader eyeballs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gone are the days when one had a single computer plugged directly into a modem (cable, DSL or good ol&#8217; Hayes). Even the days when there were just one or two computers connected via wires or invisible multi-gigahertz waves passing through the air are in the long gone by. Today (as you&#8217;ll see in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[681,3,646],"tags":[810],"class_list":["post-3871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-information-security","category-security-awareness","tag-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paths To Discovery: Mapping Your Home Network - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paths To Discovery: Mapping Your Home Network - rud.is\" \/>\n<meta property=\"og:description\" content=\"Gone are the days when one had a single computer plugged directly into a modem (cable, DSL or good ol&#8217; Hayes). Even the days when there were just one or two computers connected via wires or invisible multi-gigahertz waves passing through the air are in the long gone by. Today (as you&#8217;ll see in the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-07T16:08:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-07T21:43:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Paths To Discovery: Mapping Your Home Network\",\"datePublished\":\"2016-01-07T16:08:28+00:00\",\"dateModified\":\"2018-03-07T21:43:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/\"},\"wordCount\":381,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/maxresdefault.jpg?fit=1920%2C1080&ssl=1\",\"keywords\":[\"post\"],\"articleSection\":[\"Cybersecurity\",\"Information Security\",\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/\",\"name\":\"Paths To Discovery: Mapping Your Home Network - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/maxresdefault.jpg?fit=1920%2C1080&ssl=1\",\"datePublished\":\"2016-01-07T16:08:28+00:00\",\"dateModified\":\"2018-03-07T21:43:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/maxresdefault.jpg?fit=1920%2C1080&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/maxresdefault.jpg?fit=1920%2C1080&ssl=1\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2016\\\/01\\\/07\\\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Paths To Discovery: Mapping Your Home Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paths To Discovery: Mapping Your Home Network - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","og_locale":"en_US","og_type":"article","og_title":"Paths To Discovery: Mapping Your Home Network - rud.is","og_description":"Gone are the days when one had a single computer plugged directly into a modem (cable, DSL or good ol&#8217; Hayes). Even the days when there were just one or two computers connected via wires or invisible multi-gigahertz waves passing through the air are in the long gone by. Today (as you&#8217;ll see in the [&hellip;]","og_url":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","og_site_name":"rud.is","article_published_time":"2016-01-07T16:08:28+00:00","article_modified_time":"2018-03-07T21:43:07+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","type":"image\/jpeg"}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Paths To Discovery: Mapping Your Home Network","datePublished":"2016-01-07T16:08:28+00:00","dateModified":"2018-03-07T21:43:07+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/"},"wordCount":381,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","keywords":["post"],"articleSection":["Cybersecurity","Information Security","Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","url":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","name":"Paths To Discovery: Mapping Your Home Network - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","datePublished":"2016-01-07T16:08:28+00:00","dateModified":"2018-03-07T21:43:07+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Paths To Discovery: Mapping Your Home Network"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1920%2C1080&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p23idr-10r","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":187,"url":"https:\/\/rud.is\/b\/2011\/02\/23\/herding-firesheep\/","url_meta":{"origin":3871,"position":0},"title":"Herding [Fire]sheep","author":"hrbrmstr","date":"2011-02-23","format":false,"excerpt":"By now, many non-IT and non-Security folk have heard of Firesheep, a tool written by @codebutler which allows anyone using Firefox on unprotected networks to capture and hjijack active sessions to popular social media sites (and other web sites). The sidebar\/extension puts an attactive and easy-to-understand GUI over a process\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1824,"url":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","url_meta":{"origin":3871,"position":1},"title":"The &#8216;fing&#8217; Corollary","author":"hrbrmstr","date":"2012-12-13","format":false,"excerpt":"Back in 2011, @joshcorman posited \"HD Moore's Law\" which is basically: Casual Attacker power grows at the rate of Metasploit I am officially submitting the 'fing' corollary to said law: Fundamental defender efficacy can be ascertained within 10 'fings' The tool 'fing' : http:\/\/overlooksoft.com\/fing : is a very lightweight-yet-wicked-functional network\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12060,"url":"https:\/\/rud.is\/b\/2019\/03\/05\/heads-up-roll-your-own-http-headers-investigations-with-the-hdrs-package\/","url_meta":{"origin":3871,"position":2},"title":"Head&#8217;s Up! Roll Your Own HTTP Headers Investigations with the &#8216;hdrs&#8217; Package","author":"hrbrmstr","date":"2019-03-05","format":false,"excerpt":"I blathered alot about HTTP headers in the last post. In the event you wanted to dig deeper I threw together a small package that will let you grab HTTP headers from a given URL and take a look at them. The README has examples for most things but we'll\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":754,"url":"https:\/\/rud.is\/b\/2012\/01\/03\/businessweek-infographic-illustrates-the-pounding-we-took-in-2011\/","url_meta":{"origin":3871,"position":3},"title":"Businessweek Infographic Illustrates The Pounding We Took In 2011","author":"hrbrmstr","date":"2012-01-03","format":false,"excerpt":"Another #spiffy tip from @MetricsHulk: Evan Applegate put together a great & simple infographic for Businessweek that illustrates the number and size of 2011 data breaches pretty well. (Click for larger version) The summary data (below the timeline bubble chart) shows there was a 37.4% increase in reported incidents and\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13120,"url":"https:\/\/rud.is\/b\/2021\/07\/20\/packet-maze-solving-a-cyberdefenders-pcap-puzzle-with-r-zeek-and-tshark\/","url_meta":{"origin":3871,"position":4},"title":"Packet Maze: Solving a CyberDefenders PCAP Puzzle with R, Zeek, and tshark","author":"hrbrmstr","date":"2021-07-20","format":false,"excerpt":"It was a rainy weekend in southern Maine and I really didn't feel like doing chores, so I was skimming through RSS feeds and noticed a link to a PacketMaze challenge in the latest This Week In 4n6. Since it's also been a while since I've done any serious content\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3,"url":"https:\/\/rud.is\/b\/2011\/02\/07\/quick-hits-2011-01-07\/","url_meta":{"origin":3871,"position":5},"title":"Quick Hits :: 2011-01-07","author":"hrbrmstr","date":"2011-02-07","format":false,"excerpt":"Security Smart Servers spot & block botnet attacks [NewScientist] Passwords are *so* 2010 - Building the ultimate bad arse CUDA cracking server\u2026 [SecManiac] Programming Interesting points\/counterpoints on the efficacy of Node.js being tied so closely to the V8 javascript engine: NodeJS: To V8 or not to V8 [bruno fernandez-ruiz] On\u2026","rel":"","context":"In &quot;HTML5&quot;","block_context":{"text":"HTML5","link":"https:\/\/rud.is\/b\/category\/html5\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/3871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=3871"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/3871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media\/3876"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=3871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=3871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=3871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}