Traffic Capturing

Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should be familiar from tools like Wireshark. Active capture interferes with traffic between a client application and the server; this has great power but can cause some complications. You can think… Continue reading Traffic Capturing

What is a Network?

A network is a way to get ”stuff” between 2 or more “things” Goal: Basic understanding of common modern networking technology and terminology Examples: Analog: ’Snail’ Mail, phone system, conversations, railroad system, highways and roads. Digital: Routers & switches, clients & servers Applications: Email/Messaging, Database, Web Protocol Concepts Protocols are sets of rules. What do… Continue reading What is a Network?

Types of Threat Actors

Explain threat actor type and attributes. Types of actors Script kiddies Hacktivist Organized crime Nation states/APT Insiders Competitors Attributes of actors Internal/external Level of sophistication Resources/funding Intent/motivation And will see hot use Use of Open-Source Intelligence Threat/Threat Actor A potential occurrence that can result in an undesirable outcome. A person or thing likely to cause… Continue reading Types of Threat Actors

Social Engineering

Definition: The process by which intruders gain access to facilities, network, systems, data and even employees by exploiting the generally trusting nature of people. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Reference: Chris Hadnagy, The Art of Human Hacking (Wiley, 2010) Social… Continue reading Social Engineering