Can exponential back-off be abused to "knock off" a station off a network?

In my Cryptography & Network Security course, my professor mentioned that you can "knock off" a station of a network by abusing the timings of the exponential off algorithm used in CSMA/CD and CSMA/CA. He explains that the at… Continue reading Can exponential back-off be abused to "knock off" a station off a network?

How Data Link layer trailer prevents data from being intercepted and tampers

I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model.
It said that Data Link layer trailer can increase security as the data can’t be intercepted and tampered. How can it do it?. If it is because of t… Continue reading How Data Link layer trailer prevents data from being intercepted and tampers

MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter

At home I have two laptops (running on Windows). With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop).

To do this is run Kali Linux in a virtual environment using Vi… Continue reading MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter