addresses

technique

To create a botnet, the attacker can use several technique to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensure the spreading and installation of malicious code in little time. Which technique is discussed here ?

To create a botnet, the attacker can use several technique to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensure the spreading and installation of malicious code in little time. Which technique is discussed here ? Option …

To create a botnet, the attacker can use several technique to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensure the spreading and installation of malicious code in little time. Which technique is discussed here ? Read More »

DNS protocol

John, a professional hacker, decided to use DNS to perform data exfilteration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall?

John, a professional hacker, decided to use DNS to perform data exfilteration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall? Option 1 : DNS tunneling method Option 2 : DNS …

John, a professional hacker, decided to use DNS to perform data exfilteration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall? Read More »

Understand-IP-Address-Locating-Tools

Understand IP Address Locating Tools

Understand IP Address Locating Tools in this article explain types of tools which using for ip address location in forensic investigation. and also explain WHOIS lookup tools. 1. SmartWhois SmartWhois may be a network information utility that permits you to seem up all the available information about an IP address, hostname or domain, name of the network provider, administrator and technical support contact information. It supports Internationalized Domain Names (IDNs) and also fully supports IPv6 …

Understand IP Address Locating Tools Read More »

Verifying and Analyzing Ethernet Switching

Verifying and Analyzing Ethernet Switching A Cisco Catalyst switch comes from the factory able to switch frames. All you’ve got to do is connect the facility cable, connect the Ethernet cables, and therefore the switch starts switching incoming frames. Connect multiple switches together, and that they are able to forward frames between the switches also . and therefore the big reason behind this default behavior has to do with the default settings on the switches. Cisco Catalyst switches …

Verifying and Analyzing Ethernet Switching Read More »

Overview-of-Network-Layer Functions

Overview of Network Layer Functions

Overview of Network Layer Functions Many protocol models have existed over the years, but today the TCP/IP model dominates. And at the network layer of TCP/IP, two options exist for the most protocol around which all other network layer functions revolve: IP version 4 (IPv4) and IP version 6 (IPv6). Both IPv4 and IPv6 define the same sorts of network layer functions, but with different details. This chapter introduces these network layer functions for IPv4, …

Overview of Network Layer Functions Read More »

Overview of an Amazon Virtual Private Cloud

Overview of an Amazon Virtual Private Cloud

Overview of an Amazon Virtual Private Cloud Virtual service provides the networking layer of EC2. A VPC is a virtual network that can contain EC2 instances as well as network resources for other AWS services. By default, every VPC is isolated from all other networks. You can, however, connect your VPC to other networks, including the Internet and other VPCs. In addition to EC2, VPCs are foundational to many AWS services, so understanding how they …

Overview of an Amazon Virtual Private Cloud Read More »

Introduction to VPC Elastic Network Interfaces

Introduction to VPC Elastic Network Interfaces

Introduction to VPC Elastic Network Interfaces is an elastic network interface (ENI) allows an instance to communicate with other network resources including AWS services, other instances, on-premises servers, and the Internet. It also makes it possible for you to connect to the operating system running on your instance to manage it. As the name suggests, an ENI performs the same basic function as a network interface on a physical server, although ENIs have more restrictions …

Introduction to VPC Elastic Network Interfaces Read More »

sending-data-in-ethernet-networks

Sending Data in Ethernet Networks

Sending Data in Ethernet Networks Although physical layer standards vary quite bit, other parts of the Ethernet Networks standards work  the same way, no matter the sort of physical Ethernet link.Next, this final major section of this chapter looks at several protocols and rules that Ethernet uses no matter the sort of link. especially , this section examines the details of the Ethernet Networks link layer protocol, plus how Ethernet nodes, switches, and hubs forward …

Sending Data in Ethernet Networks Read More »

_IOS Switch Commands-infosavvy

IOS Switch Commands

Switchport port-security IOS Switch Commands, The switch port port-security command configures the port parameters to enable port security. switchport port-security maximum 1 The switch port port-security maximum command configures the maximum number of secure MAC addresses for the port. The switch port port-security maximum 1 command configures the maximum number of secure MAC addresses for the port as 1. switchport port-security violation restrict The switchport port-security violation command sets the violation mode and therefore the …

IOS Switch Commands Read More »

DHCP Starvation Attack-infosavvy

DHCP Starvation Attack

In a DHCP starvation attack, an attacker floods the DHCP server by sending a large number of DHCP requests and uses all of the available IP addresses that the DHCP server can issue. As a result, the server cannot issue any longer IP addresses, resulting in Denial-of-Service (DoS) attacks, due to this issue, valid users cannot obtain or renew their IP addresses, and thus fail to access their network. An attacker broadcasts DHCP requests with spoofed …

DHCP Starvation Attack Read More »