June 23, 2025

What Happens When IPs Run Out? Why You Should Test Your Network Gear to Find Out


Understanding how your network equipment behaves when it runs out of IP addresses is critical for preventing service disruptions. In a dynamic environment—especially one that uses DHCP—it's not uncommon to exhaust a pool of IPs due to misconfiguration, long lease times, or unexpected device growth. In this blog post, I share a video where I put my own equipment to the test, intentionally running out of available IPs and using both Wireshark and the device logs to observe what happens behind the scenes. The results offer valuable insight into how your tools respond under pressure—and where potential failure points might lie.

Wireshark is a powerful ally during this kind of testing. By capturing the packet exchange between devices trying to obtain an IP and the DHCP server’s responses (or lack thereof), you can see the exact sequence of discovery, request, or any failures. This helps identify whether clients simply stop trying, whether they send repeated requests, or whether the server gives any clues about what’s going wrong. In my test, Wireshark confirmed DHCP requests were being made but no responses were coming back once the pool was depleted—a clear indicator of exhausted resources.

Logs from the equipment itself provided a second layer of confirmation. My router log showed a DHCP message. Together, the packet data and device logs painted a full picture of what went wrong and how long it took to recover once addresses became available again. Testing like this helps network technicians preempt issues in real deployments and refine their monitoring and alerting setups. Don’t wait until a user reports connectivity problems—simulate them, study the response, and be ready.

some of the gear you see

NetAlly Linkrunner 

https://amzn.to/4ls8Rrh

Ubiquiti EdgeRouter 4 (ER-4)

https://amzn.to/4en9sIs

Ubiquiti EdgeSwitch 8, 8-Port Managed PoE+ Gigabit Switch

https://amzn.to/45HOYrK



June 20, 2025

Friday Freebie - Introduction to Dark Web, Anonymity, and Cryptocurrency


 I'm trying something new, so if you like it, give us a LIKE

The EC-Council's "Introduction to Dark Web, Anonymity, and Cryptocurrency" course offers a foundational exploration into the concealed segments of the internet, emphasizing the dark web's structure and functionality. Participants learn about the dark web's reliance on overlay networks like Tor, which utilize onion routing to maintain user anonymity and access to .onion domains. The course also addresses common misconceptions, distinguishing between the dark web and the broader deep web, and discusses the dual-use nature of these technologies, highlighting both their legitimate applications and potential for misuse.(en.wikipedia.org)

In addition to exploring the dark web, the course delves into tools and practices for achieving online anonymity. It covers the use of anonymizing browsers such as Tor, the importance of VPNs, and the role of secure communication platforms. These tools are essential for users aiming to protect their identities and maintain privacy in digital interactions. The curriculum emphasizes the significance of operational security (OpSec) and educates learners on how to safeguard their digital footprints against potential threats.(en.wikipedia.org)

A significant portion of the course is dedicated to understanding cryptocurrencies, with a focus on their role in anonymous transactions. It examines how cryptocurrencies like Monero and Bitcoin are utilized within the dark web for various purposes, including illicit activities. The course also introduces concepts such as cryptocurrency tumblers, which are used to obscure transaction trails, thereby enhancing user anonymity. By the end of the course, participants gain a comprehensive understanding of how anonymity and cryptocurrency intersect within the context of the dark web, equipping them with the knowledge to navigate and analyze these complex digital landscapes.(en.wikipedia.org)

click on the image to access the course


June 18, 2025

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert


 Here’s a concise three‑paragraph summary of the article from The Hacker News about the TP‑Link router vulnerability:

1. Discovery and SeverityOn June 17, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical flaw—CVE‑2023‑33538—to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, which carries a high CVSS score of 8.8, is a command injection bug in multiple models of TP‑Link routers (TL‑WR940N V2/V4, TL‑WR841N V8/V10, TL‑WR740N V1/V2). Attackers can exploit it by sending specially crafted HTTP GET requests using the ssid1 parameter to trigger arbitrary command execution on the device (thehackernews.com).


2. Exploitation & Support StatusCISA’s inclusion in the KEV catalog indicates that the flaw is actively being exploited. However, details remain scarce regarding the scale of attacks or the threat actors involved . Complicating remediation, TP‑Link has officially ended support for the affected models, meaning no firmware patches are forthcoming. Consequently, CISA recommends discontinuing their use or applying mitigations where possible (thehackernews.com).


3. Wider Context & Compliance DeadlineThis development follows earlier research into OT‑centric malware (like FrostyGoop/BUSTLEBERM) that suggested but didn’t confirm exploitation via this vulnerability (thehackernews.com). Additionally, CISA has set a compliance deadline—by July 7, 2025, federal agencies must remediate or phase out vulnerable devices (thehackernews.com). The article also draws parallels to similar ongoing threats, such as exploits targeting Zyxel firewalls (CVE‑2023‑28771), which have been weaponized for DDoS botnets (thehackernews.com).



click the image for the article

June 17, 2025

What I Learned from the LinkRunner in my lab


In the world of network troubleshooting, your tools are only as powerful as your understanding of them. Recently, I decided to test my NetAlly LinkRunner in a very specific scenario: what happens when all IP addresses in a subnet are exhausted? This wasn’t just a curiosity-driven test—it was a chance to explore the limits of the device and see exactly how it handles edge cases that might occur in the real world. Understanding these reactions ahead of time can make all the difference during critical on-site diagnostics.

During the test, I configured a small DHCP pool with only one address. Once the address was used, I connected the LinkRunner to see how it would behave. The result was clear and educational—the device accurately reported a DHCP failure, but lacked any further details. The only clue was that there wasnt a DHCP response, but that could be caused by anything.  This insight confirmed that the LinkRunner detected the problem, but the technician needs to interpret and investigate what it means.

This small but revealing test reinforced a key principle: knowing your tool is just as important as owning it. Anyone can use a tester to look for cable issues or ping a gateway, but understanding how your equipment behaves under non-ideal circumstances is what separates reactive troubleshooting from proactive problem-solving. By regularly testing our tools and pushing their boundaries, we prepare ourselves for real-world issues—and ensure we're not caught off guard when they strike. 

In some cases, vendors take this kind of feedback and tweak the product moving forward.



June 14, 2025

Ubiquiti Geo Ip Blocking Follow up


 Verifying changes to your firewall after making modifications is crucial for maintaining the security and functionality of your network. Firewalls serve as the first line of defense against unauthorized access, so it's essential to ensure that any rules or configurations you've implemented are actively working as intended. Simply assuming that changes have taken effect without confirmation can leave your system vulnerable to threats or cause disruptions in legitimate traffic.

When you go back and double-check the firewall, you can identify and resolve any misconfigurations or errors that may have occurred during the initial setup. For example, a typo in an IP address or a misapplied rule could prevent important services from functioning or allow unauthorized traffic through. These mistakes are often subtle and easy to overlook, but their impact can be significant, ranging from minor disruptions to major security breaches.

Verification also helps ensure compliance with organizational policies and regulatory requirements. Many industries require documentation and proof that security measures are actively enforced. Testing and confirming firewall changes can serve as a record of due diligence and proactive network management, which can be crucial during audits or security reviews. Without proper verification, you may be unable to demonstrate that necessary precautions have been effectively implemented.

Finally, revisiting your firewall after changes fosters good operational habits and enhances your overall security posture. It encourages a disciplined approach to network management, reduces downtime caused by unexpected rule behavior, and builds confidence in your security infrastructure. In fast-paced IT environments, it's easy to overlook this step, but consistently validating your firewall changes is a small effort that pays off in long-term stability and protection.

in this video i use my Profitap IOTA packet capture tool to investigate



Popular post in the past 30 days