Skip to content

Blog

The Blog

  • Home

Network Protocol Structures : Numbering

sri Jan 25, 2023 IT Security, Networking
New protocols are being invented and applied rapidly. Basics remains the same at foundation levels. Good understanding of these intact numbering mechanisms are mandatory to

Read More »

Read More

Routing Network Traffic : For Traffic Capture

sri Jan 3, 2023 IT Security, Networking, Offensive Security, Pentesting, Unix/Linux
Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other

Read More »

Read More

Traffic Capturing

sri Nov 28, 2022 Uncategorized
Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should

Read More »

Read More

What is IPS – Internet Protocol Suite?

sri Nov 28, 2022 IT Security, Networking
TCP/IP is the de facto protocol that modern networks use. Although you can think of TCP/IP as a single protocol, it’s actually a combination of

Read More »

Read More

What are Functions of Protocol?

sri Nov 28, 2022 IT Security, Networking
Maintaining session state Protocols typically implement mechanism to create new connections and terminate existing connections. Identifying nodes through addressing Data must be transmitted to the

Read More »

Read More

Tuning Up the Interface for Sniffing

sri Jun 16, 2020 IT Security, Networking, Unix/Linux
https://cromwell-intl.com/open-source/performance-tuning/ethernet.html

Read More »

Read More

Application Security – Missed Plots Redefined – BSIMM

sri Dec 21, 2019 IT Security, Networking, Software Engineering
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies

Read More »

Read More

Network Technologies and Tools

sri Sep 25, 2019 IT Security, Networking, Security+
Install and configure network components, both hardware and software-based, to support organizational security. Firewall / UTM NIDS / NIPS VPN Concentrator Firewalls Isolate one network

Read More »

Read More

Network Components

sri Sep 8, 2019 IT Security, Networking, Security+
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS / NIPS VPN Concentrator Wireless

Read More »

Read More

What is a Network?

sri Sep 7, 2019 IT Security, Networking, Security+, Uncategorized
A network is a way to get ”stuff” between 2 or more “things” Goal: Basic understanding of common modern networking technology and terminology Examples: Analog:

Read More »

Read More

Cyber Technologies and Tools

sri Sep 7, 2019 IT Security, Security+
A Cyber Security Professional must posses following skills to master the field. Each skills can be acquired over the time with proper working experience and

Read More »

Read More

Vulnerability Scanning Concept

sri Sep 6, 2019 IT Security, Security+
Process Passively test security controls – Does not exploit a vulnerability. Identify vulnerability / System Flaw / Un-patched Code Identify lack of security controls Identify

Read More »

Read More
  • Developing
  • Do It Yourself!
  • IT Security
  • Networking
  • Offensive Security
  • Pentesting
  • Precautions
  • Riding Diaries
  • Security+
  • Software Engineering
  • System Designing
  • Testing
  • Uncategorized
  • Unix/Linux

Amplification Application Attacks ARP Poisoning authentication header Bluejacking Clickjacking DDoS DNS poisoning Domain Hijacking DoS Dumpster Diving encryption Evil Twin Firewall Impersonation Initialization Vector(IV) Jamming MAC Spoofing Man in the middle Networking Phishing Privilege Escalation QA Replay Ride SriLanka Rogue AP SDLC Session Hijacking Software Development Software Documentation Software Engineering Software Testing Spear Phishing Switch Security Tailgating Test Plan Trojan Typo Squatting URL hijacking Virtual Lan Vishing Vlan Whaling Why To Document? Zones

  • Home
Blog
Proudly powered by WordPress.