![]() ![]() That’ll give you a basic list of names, IP addresses, and MAC addresses. Log in to your router and check its list of connected devices. Once you have a physical map of your network and a list of all of your trusted devices, it’s time to go digging. Step two: Probe your network to see who’s on it Take a physical inventory first, then move on to the digital one. Unless you can identify everything on your network by its IP and MAC address, you’ll just get a big list of stuff-one that includes any intruders or freeloaders. You may be tempted to just log in to your router and look at its status page to see what’s connected, but don’t do that yet. If (or when) it doesn’t, you’ll be able to quickly separate what you do know from what you don’t know. Do an inventory of the devices on it, identify them, and then see if the reality matches up with what you expect. Network admins and engineers will recognize this step-it’s the first step in exploring any network you’re not familiar with. You may be surprised by exactly how many devices you have connected to the internet at the same time. ![]() Then write down every device and where it lives. If it helps, draw a room-by-room map of your home. That includes things like smart TVs, smart speakers, laptops and computers, tablets and phones, or any other device that might be connected to your network. Start with a sheet of paper and jot down all of your connected devices. Step one: Make a network mapīefore you even log onto your computer, write down what you think you know about your network. Your friendly neighborhood IT department wouldn’t like you port scanning or sniffing packets on the corporate network, and neither would all the people at your local coffee shop. If not, head over to our Know Your Network night school to brush up first.īefore we go any further, though, we should issue a warning: Use these powers for good, and only run these tools and commands on hardware or networks you own or manage. We’ll assume you’re familiar with some networking basics, like how to find your router’s list of devices and what a MAC address is. In short: You’ll be able to recognize the signs that something on your network is compromised. In this post, we’ll show you how to map out your network, take a peek under the covers to see who’s talking to what, and how to uncover devices or processes may be sucking down bandwidth (or are unexpected guests on your network). Behind your login lies tons of valuable information, from unencrypted files containing personal data to devices that can be hijacked and used for any purpose. Your home network-and everything connected to it-is like a vault. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |