Network Security

Metasploit Framework

2020-09-24T10:28:50+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , |

A kind of penetration testing aid is the Metasploit Project. This open-source framework allows testing via command line alterations or GUI. The Metasploit Framework is a Ruby-based, modular penetration testing platform that enables a pentester (hacker) to writes, tests, and executes exploit code. In other words, the Metasploit framework is a very powerful tool which can [...]

Zero-day Vulnerabilities and Zero-day Exploits

2020-09-24T10:32:09+00:00Categories: Network Security|Tags: , , , , , , , , , , , |

Zero-day is a flaw in software, hardware or firmware that it has the potential to be exploited by cybercriminals. In other words, zero-day is a vulnerability in a system or device that has been disclosed but is not yet patched. A zero day exploit is a cyber-attack that occurs on the same day a weakness [...]

Penetration Testing

2020-09-24T10:36:23+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

A penetration test (pen test or pentest and or ethical hacking) is a simulated cyber-attack against a computer system to check for exploitable vulnerabilities. You should not be confused it with a vulnerability assessment. Source: en.wikipedia.org In fact, this test simulates a real-world attack to determine how any defenses will fare and the possible magnitude [...]

ManageEngine ADAudit

2020-09-24T11:34:03+00:00Categories: Microsoft, Network Administration, Network Security|Tags: , , , , , , , , , , , , , , , , |

In this post, we'll take a look at ManageEngine ADAudit to help you understand the different aspects of this network product. You can use ManageEngine ADAudit to ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects (like Users, Groups, GPOs, Computers, OUs, etc.). [...]

Broadcast Storm

2020-09-02T05:50:23+00:00Categories: Network Security|Tags: , , , , , , , , , |

A broadcast storm is also known as a network storm. It is an abnormally high number of broadcast packets within a short period of time. The broadcast storm is one of the major deficiencies in computer network systems and it can shut down entire network in seconds. When different nodes are sending/broadcasting data over a [...]

Wireshark

2020-09-24T11:37:32+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Wireshark is a network packet analyzer. This software one of the best packet analyzers available today and is available for free, and it is open source. This software, formerly known as Ethereal but the project was renamed Wireshark in May 2006 due to trademark issues. Sources: wireshark.org   and  en.wikipedia.org Wireshark is cross-platform and it runs [...]

SSL and TLS

2020-09-24T11:41:19+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and encrypted links between networked computers. [...]

Wireless Security Protocols

2020-09-26T05:59:54+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. In this post, we'll take a look at wireless security protocols to help you understand the different aspects of these protocols. Source:  en.wikipedia.org There are several types of wireless security Protocol that you’ll come [...]

Syslog

2020-09-01T12:49:52+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , |

Syslog stands for “System Logging Protocol,” Syslog used for system management and security auditing as well as general informational, analysis, and debugging messages. Syslog is a way for network devices to send event messages to a logging server. This protocol can be used to log different types of events. For example, a router might send [...]

Go to Top