http

web service

Gillbert, a web developer, uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

Gillbert, a web developer, uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario? Option 1 : SOAP API Option 2 : RESET …

Gillbert, a web developer, uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario? Read More »

protocol

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic?

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup  a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic? Option 1 : RPC and the best practice is to disable RPC completely Option 2 :  SNMP and he should change it to SNMP …

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic? Read More »

port

What is the port to block first in case you are suspicious that an IoT device has been compromised?

What is the port to block first in case you are suspicious that an IoT device has been compromised? Option 1 : 443 Option 2 : 22 Option 3 : 80 Option 4 : 48101 1. 443 You can perceive Port 443 as an online browsing port wont to secure browser communication or HTTPS services. It will offer coding and transport over secure ports. Thus, the information you transfer across such connections are extremely proof …

What is the port to block first in case you are suspicious that an IoT device has been compromised? Read More »

What-is-Apache-web-server-Architecture-in-Forensic-Investigation

What is Apache web server Architecture in Forensic Investigation?

Apache web server Architecture in Forensic Investigation in this the apache web server comprises of a modular approach. It consists of two major components, the Apache Core and the Apache Modules. The Apache Core deals with basic functionalities of the server, such as allocating the requests, maintaining and pooling the connections, etc., while the Apache Modules, which are simply add-ores (used for extending the core functionality of the server), looks after other functions, such as …

What is Apache web server Architecture in Forensic Investigation? Read More »

Learn-Skills-From-Web-Server-Foot-Printing / Banner-Grapping

Learn Skills From Web Server Foot Printing / Banner Grapping

Learn Skills From Web Server Foot Printing / Banner Grapping By performing web server foot printing, you’ll gather valuable system-level data like account details, OS, software versions, server names, and database schema details. Use Telnet utility so as to footprint an internet server and gather information like server name, server type, operating systems, applications running, and so on. Use footprinting tools like Netcraft, ID Serve and httprecon, then on to perform web server foot printing, …

Learn Skills From Web Server Foot Printing / Banner Grapping Read More »