Except the CLI hasn’t been updated in ages
Except the CLI hasn’t been updated in ages
Since we’re talking specifically about network traffic, let’s clarify the scope of the problem for reference.
You want to see what is being sent outside, to the wide internet from your network, and how might you be compromised by this traffic.
The logical method would be to snoop on this information. The question is, how would you do that?
port-mirroring
- mirror the traffic through your WAN-facing port into an analyser to check just what is it that you’re sending out. Note that this will likely require extensive effort and time since everyone has different traffic they would like to check, and coming up with robust checks is entering the field of security professionals.
Some considerations:
I know people will come up with “but they don’t spy on you! It needs to be explicitly turned on to spy on you!” and “get a thinkpad bro, modify the HAP bit!”, however, both arguments don’t hold much weight considering the hardware readily available to the common user (bit of a fallacy, but we’ll go with it). The point stands; such behaviour shall not be tolerated in a self-aware user’s network, and needs to eradicated the second the user gets a whiff of such mischief playing out. I hope my note has ignited a willingness in you to prevent such rabid deanonymisation attempts to one’s self in this age, and will spur you to fortify your network to prevent such malice from breaking anonymity and trust on hardware.
Indeed, dnsmasq
would be much easier to handle than BIND OOTB. I have personally not come across a reason to use BIND for myself, and struggle to see its appeal out of the enterprise/enterprise-like labs, but I don’t really know much about homelabbing either
DNS. It’s always DNS
Hi, could you detail how you utilise Asterisk?
Hi, thanks for your comment! I just visited your blog and noticed that it loads fairly quickly: I assume you must have some sort of CDN set up. Could you point me to how you went about setting up the CDN for your domain/website? Thanks!
Run a transparent encryption program and buy a Google drive subscription of 2TB for a year for $100.