ethernet

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task? Option 1: ARP ping scan Option 2: TCP Maimon sacn Option 3: ACK flag prob sacn Option 4: UDP scan 1. ARP ping scan One of the foremost common Nmap …

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task? Read More »

How-to-Access-Cisco-Catalyst-&-Switch-CLI

How to Access Cisco Catalyst & Switch CLI

This article is explain How to Access Cisco Catalyst & Switch CLI , Cisco catalyst switches & Accessing the cisco IOS CLI. Cisco uses the concept of a command-line interface (CLI) with its router products and most of its Catalyst LAN switch products. The CLI may be a text-based interface during which the user, typically a network engineer, enters a text command and presses Enter. Pressing Enter sends the command to the switch, which tells …

How to Access Cisco Catalyst & Switch CLI Read More »

How-can-we-Cabling-the-Console-Connection

How can we Cabling the Console Connection

How can we Cabling the Console Connection in this article is explaining how to cabling console connection in PC using switches and USB. The physical console connection, both old and new, uses three main components: the physical console port on the switch, a physical interface on the PC, and a cable that works with the console and serial ports. However, the physical cabling details have changed slowly over time, mainly due to advances and changes …

How can we Cabling the Console Connection Read More »

LAN-Switching-Concepts

What are the LAN Switching Concepts

LAN Switching Concepts A modern Ethernet LAN connects user devices also as servers into some switches, with the switches then connecting to every other, sometimes during a design like Figure 7-1. a part of the LAN, called a campus LAN, supports the end user population as shown on the left of the figure. user devices connect to LAN switches, which in turn connect to other switches so that a path exists to the rest of …

What are the LAN Switching Concepts Read More »

Verifying and Analyzing Ethernet Switching

Verifying and Analyzing Ethernet Switching A Cisco Catalyst switch comes from the factory able to switch frames. All you’ve got to do is connect the facility cable, connect the Ethernet cables, and therefore the switch starts switching incoming frames. Connect multiple switches together, and that they are able to forward frames between the switches also . and therefore the big reason behind this default behavior has to do with the default settings on the switches. Cisco Catalyst switches …

Verifying and Analyzing Ethernet Switching Read More »

Introduction-to-Leased-Lines-WAN-(Wide Area Network)

Introduction to Leased Lines WAN (Wide Area Network)

Leased Lines WAN (Wide Area Network) Introduction to Leased Lines WAN (Wide Area Network) this is a part of networking and in this article you will learn Positioning Leased-Line with LANs and Routers, Physical details of Leased-Lines and Building a WAN Link during a Lab. Imagine that you are the primary network engineer for an enterprise TCP/IP inter network. Your company is building a new building at a site 100 miles away from your corporate …

Introduction to Leased Lines WAN (Wide Area Network) Read More »

sending-data-in-ethernet-networks

Sending Data in Ethernet Networks

Sending Data in Ethernet Networks Although physical layer standards vary quite bit, other parts of the Ethernet Networks standards work  the same way, no matter the sort of physical Ethernet link.Next, this final major section of this chapter looks at several protocols and rules that Ethernet uses no matter the sort of link. especially , this section examines the details of the Ethernet Networks link layer protocol, plus how Ethernet nodes, switches, and hubs forward …

Sending Data in Ethernet Networks Read More »

Overview of the TCP/IP Networking Model

This blog is on TCP/IP networking model in that Overview has given as well as there different layer has been explained. Overview The TCP/IP model both defines and references a large collection of protocols that allow computers to communicate. To define a protocol, TCP/IP uses documents called Requests For Comments (RFC). (You can find these RFCs using any online search engine.) The TCP/IP model also avoids repeating work already done by another standards body or …

Overview of the TCP/IP Networking Model Read More »

Everything-You-Need-To-Know-About-Sniffing – Part-1

Everything You Need To Know About Sniffing – Part 1

Everything You Need To Know About Sniffing – Part 1 in this article you will learn about network sniffing, passive sniffing, active sniffing and different types of sniffing techniques. We will also consider a scenario wherein how attackers hacks network using sniffers. What is a sniffer in hacking? This section describes network sniffing and threats, how a sniffer works, active and passive sniffing, how an attacker hacks a network using sniffers, protocols susceptible to sniffing, …

Everything You Need To Know About Sniffing – Part 1 Read More »