toolology

joined 1 year ago
[–] [email protected] 1 points 1 year ago (1 children)

You can call them CPE or Customer Premise Equipment.

[–] [email protected] 1 points 1 year ago

Theoretically, there could be hardware/software running on the device that learns the source/destination IP addresses of frames passing through it and then assigns itself a suitable static IP so you wouldn't see it in your router's DHCP table and then phones home that way.....

Theoretically. You could try to just plug a single computer into it and run wireshark and see if you see anything. Theoretically its possible for it to not broadcast or send its own traffic until a gateway IP is identified and learned but this would be highly theoretical stuff.

I think all in all the effort to create a compromised stealth switch like this would GREATLY outweigh the effort required to create a working switch with a trusted brand name in a crowded market segment. But hey anything's possible when you wear tinfoil on your head.

[–] [email protected] 0 points 1 year ago (5 children)

Is this a windows server? The firewall maybe only be set to respond to pings (icmp echo request) from the local subnet. Its on the scope tab of the firewall rule.

[–] [email protected] 2 points 1 year ago (2 children)

I hate it when my servers are unreasonable

[–] [email protected] 1 points 1 year ago
[–] [email protected] 1 points 1 year ago (1 children)

Write a web scraper but don't tell anyone.

There's probably a few already made ones on github