Upside-Down-Ternet (Classic Prank and Good Wireless Security)
Apr 01, 2009, 14:31 (0 Talkback[s])
"Split the network
I'm starting here by splitting the network into two parts, the
trusted half and the untrusted half. The trusted half has one
netblock, the untrusted a different netblock. We use the DHCP
server to identify mac addresses to give out the relevant
"IPtables is Fun!
Suddenly everything is kittens! It's kitten net.
/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp
-j DNAT --to-destination 220.127.116.11
"For the uninitiated, this redirects all traffic to