interface

domains

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario.

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario. Option 1 : Use of DNS tunneling Option 2 : Unspecified proxy activities Option 3 : Use of command-line interface Option 4 : Data staging 1. Use of DNS tunneling DNS tunneling enables these cyber criminals to insert malware or …

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario. Read More »

switch

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario?

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario? Option 1 : …

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario? Read More »

protocol

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic?

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup  a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic? Option 1 : RPC and the best practice is to disable RPC completely Option 2 :  SNMP and he should change it to SNMP …

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic? Read More »

Stegnography Softwares

Steganography Software

Steganography Steganography is that the art of hiding a secret message within a traditional message. this is often wont to transfer some secret message to a different person; with this method, nobody else in between will know the key message you wanted to convey. This art of hiding secret messages has been used for years in real-life communications. Since the evolution of data communication, it’s also been utilized in digital conversations. On a computer, this …

Steganography Software Read More »

Understand-Network-Forensics-Analysis-Mechanism

Understand Network Forensics Analysis Mechanism

This network forensics analysis mechanism includes presenting the evidence, manipulating, and automated reasoning. Analyst Interface The analyst interface provides visualization of the evidence graph and reasoning results to the analyst, who passes the feedback to the graph generation and reasoning components. Evidence Collection Evidence collection involves the collection of intrusion evidence from networks and hosts under investigation. Evidence Preprocessing Evidence preprocessing deals with the analysis of assertive types of evidence, such as intrusion alerts, into …

Understand Network Forensics Analysis Mechanism Read More »

An Overview of Encrypting File Systems (EFS)

An Overview of Encrypting File Systems | EFS

In this blog explain The Encrypting File System | EFS is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. To protect files from mishandling and to ensure their security, the system should encrypt them. NTFS has Encrypting File System (EFS) as built-in feature. Encryption in file systems uses symmetric key encryption technology …

An Overview of Encrypting File Systems | EFS Read More »

Hard-Disk-Interfaces

Hard Disk Interfaces

Hard Disk Interfaces in this the hard disk drive connects to the PC using an interface. There are various types of interfaces: IDE, SATA, Fiber Channel, SCSI, etc. 1. ATA DATA (IDE/EIDE) IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard’s data paths or bus and the computer’s disk storage devices, such as hard drives and CD-ROM/DVD drives. The IBM PC Industry Standard Architecture (ISA) 16-bit bus standard is base …

Hard Disk Interfaces Read More »

How-to-Access-Cisco-Catalyst-&-Switch-CLI

How to Access Cisco Catalyst & Switch CLI

This article is explain How to Access Cisco Catalyst & Switch CLI , Cisco catalyst switches & Accessing the cisco IOS CLI. Cisco uses the concept of a command-line interface (CLI) with its router products and most of its Catalyst LAN switch products. The CLI may be a text-based interface during which the user, typically a network engineer, enters a text command and presses Enter. Pressing Enter sends the command to the switch, which tells …

How to Access Cisco Catalyst & Switch CLI Read More »

How-can-we-Cabling-the-Console-Connection

How can we Cabling the Console Connection

How can we Cabling the Console Connection in this article is explaining how to cabling console connection in PC using switches and USB. The physical console connection, both old and new, uses three main components: the physical console port on the switch, a physical interface on the PC, and a cable that works with the console and serial ports. However, the physical cabling details have changed slowly over time, mainly due to advances and changes …

How can we Cabling the Console Connection Read More »

How-to-Configuring-Cisco-IOS-Software

How to Configuring Cisco IOS Software

How to Configuring Cisco IOS Software first you will want to configure every switch in an Enterprise network, even though the switches will forward traffic even with default configuration. This section covers the essential configuration processes, including the concept of a configuration file and therefore the locations during which the configuration files are often stored. Although this section focuses on the configuration process, and not on the configuration commands themselves, you must know all the …

How to Configuring Cisco IOS Software Read More »