“Split the network
I’m starting here by splitting the network into two parts, the
trusted half and the untrusted half. The trusted half has one
netblock, the untrusted a different netblock. We use the DHCP
server to identify mac addresses to give out the relevant
addresses…“IPtables is Fun!
Suddenly everything is kittens! It’s kitten net.
/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp
-j DNAT –to-destination 64.111.96.38“For the uninitiated, this redirects all traffic to
kittenwar.”
Upside-Down-Ternet (Classic Prank and Good Wireless Security)
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis