Yesterday I started chatting with #Kimi-K2.5 on the #Ollama cloud and described a pain point. A bit of constructive back and forth, but then I had an idea so I copied the chat to #Claude and realized that I didn’t need to struggle so hard about #VMWare #VeloCloud GUI #arp tables to help me get the IP’s from the MAC addresses I had. I have #QNAP #NAS devices in every branch of my #workplace! So I set up #ssh key pairs to each QNAP, passwordless access. (1/3)
Installed #Entware on each QNAP, then arp-scan and its database. I setuid on the arp-scan executable to be root, so I can skip fussing with password entry, and now I have an on-demand arp table canary in each branch! That was amazing! With MACWatch I could search each branch, pick off devices I recognized and soon I’ll have a live list of every device my coworkers plug into my network or join to any of my #wifi access points! (2/3)

Claude even wrote a fingerprinting routine that spits findings to a file so I can see everything that #nmap can find on the wire. Don’t need coworkers, and I don’t need anyone knowing I’m sniffing around. I can catch them red-handed and just turn off the ports or block the MAC’s I don’t like. Stuff that threatens cybersecurity.

All for a #LLM development cycle that accidentally and unexpectedly started and ended around a red light on my commute home.

Life keeps getting better. (3/3)