A deep technical dive into how MITM attacks actually work in Ethernet, IPv4, and IPv6 networks from ARP and DHCP to IPv6 RA, DNS, and FHRP spoofing.
I have released a new version v1.3.0 of my tool Sara, a RouterOS configuration analyzer.
This is research on detecting attacks on Kerberos using traffic analysis.
A short demo of Noir, a tool that analyzes Juniper JunOS configurations for vulnerabilities, weak access controls, and misconfigurations.