Network Protocol Structures : Numbering
New protocols are being invented and applied rapidly. Basics remains the same at foundation levels. Good understanding of these intact numbering mechanisms are mandatory to
Routing Network Traffic : For Traffic Capture
Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other
Traffic Capturing
Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should
What is IPS – Internet Protocol Suite?
TCP/IP is the de facto protocol that modern networks use. Although you can think of TCP/IP as a single protocol, it’s actually a combination of
What are Functions of Protocol?
Maintaining session state Protocols typically implement mechanism to create new connections and terminate existing connections. Identifying nodes through addressing Data must be transmitted to the
Tuning Up the Interface for Sniffing
https://cromwell-intl.com/open-source/performance-tuning/ethernet.html
Application Security – Missed Plots Redefined – BSIMM
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies
Network Technologies and Tools
Install and configure network components, both hardware and software-based, to support organizational security. Firewall / UTM NIDS / NIPS VPN Concentrator Firewalls Isolate one network
Network Components
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS / NIPS VPN Concentrator Wireless
What is a Network?
A network is a way to get ”stuff” between 2 or more “things” Goal: Basic understanding of common modern networking technology and terminology Examples: Analog:
Cyber Technologies and Tools
A Cyber Security Professional must posses following skills to master the field. Each skills can be acquired over the time with proper working experience and
Vulnerability Scanning Concept
Process Passively test security controls – Does not exploit a vulnerability. Identify vulnerability / System Flaw / Un-patched Code Identify lack of security controls Identify
- Developing
- Do It Yourself!
- IT Security
- Networking
- Offensive Security
- Pentesting
- Precautions
- Riding Diaries
- Security+
- Software Engineering
- System Designing
- Testing
- Uncategorized
- Unix/Linux
Amplification Application Attacks ARP Poisoning authentication header Bluejacking Clickjacking DDoS DNS poisoning Domain Hijacking DoS Dumpster Diving encryption Evil Twin Firewall Impersonation Initialization Vector(IV) Jamming MAC Spoofing Man in the middle Networking Phishing Privilege Escalation QA Replay Ride SriLanka Rogue AP SDLC Session Hijacking Software Development Software Documentation Software Engineering Software Testing Spear Phishing Switch Security Tailgating Test Plan Trojan Typo Squatting URL hijacking Virtual Lan Vishing Vlan Whaling Why To Document? Zones