mac

switch

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario?

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario? Option 1 : …

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rough switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in above scenario? Read More »

Sample DHCP Audit Log File

Sample DHCP Audit Log File in this DHCP server during a network allocates IP address to a computer during its begin. Therefore, the DHCP server logs contain information regarding the systems that were assigned specific IP addresses by the server, at any given instance. Investigators can examine these logs during forensic examinations. Now DHCP administrators can easily access this data using the built-in logging mechanisms. The DHCP activity log are often read during a text-based …

Sample DHCP Audit Log File Read More »

Mac-Forensics

Mac Forensics

Mac Forensics in this article Mac is short for the Macintosh operating systems developed by Apple to support its line of devices and series of personal computers, Mac is one of the most adopted systems across the globe and is also facing increase in number of attacks annually. The investigators must have knowledge of Mac, its process, policies, functions and internal storage patters used by the operating system to be able to perform forensics. This …

Mac Forensics Read More »

Recovering-Deleted-Partitions

Recovering Deleted Partitions

Recovering Deleted Partitions in this article explain how to recover delete partition and which of the tools using in it. What happens when deleting a partition? When a user deletes a partition from a hard disk drive, two things are possible: All data will be lost on that deleted partition or logical drive. In the case of a dynamic disk, deleting a partition can delete all the dynamic volumes on the disk, leaving the disk …

Recovering Deleted Partitions Read More »

Understand-File-Recovery-in-Mac-OS-X-MAC-and-Linux

Understand File Recovery in Mac OS X, MAC and Linux

Understand File Recovery in Mac OS X, MAC and Linux in this article explain Mac OS X, MAC and Linux file recovery methods and tools. In Mac OS X, data deletion can be possible due to the following reasons: Emptying the Mac Trash folder Using the Shift+Del keys Corruption in a hard drive Virus or Trojan Infection Unexpected system shutdown Software or hardware malfunction Recovering deleted files in Mac OS X has three methods: 1. …

Understand File Recovery in Mac OS X, MAC and Linux Read More »

Overview-of-Mac-OS-X-File-Systems

Overview of Mac OS X File Systems

Overview of Mac OS X File Systems in this article Apple’s Mac OS X uses a different approach in storing the data, when compared to the Windows and Linux. This section will make investigators aware of the file systems that different versions of Mac operating systems use. Mac OS X File Systems 1. Hierarchical File System (HFS) Apple had developed the Hierarchical File System (HFS) in September 1985 to support the MAC OS in its …

Overview of Mac OS X File Systems Read More »

LAN-Switching-Concepts

What are the LAN Switching Concepts

LAN Switching Concepts A modern Ethernet LAN connects user devices also as servers into some switches, with the switches then connecting to every other, sometimes during a design like Figure 7-1. a part of the LAN, called a campus LAN, supports the end user population as shown on the left of the figure. user devices connect to LAN switches, which in turn connect to other switches so that a path exists to the rest of …

What are the LAN Switching Concepts Read More »

Introduction-to-the-Command-Line-Interface-(CLI)-with-the-help-of-Features

Introduction to the Command Line Interface (CLI) with the help of Features

Introduction to the Command Line Interface (CLI) with the help of Features In this article is explaining CLI Features , how to use CLI & how to debug CLI. If you printed the Cisco IOS Command Reference documents, you’d end up with a stack of paper several feet tall. nobody should expect to memorize all the commands—and nobody does. you’ll use several very easy, convenient tools to assist remember commands and save time typing. As …

Introduction to the Command Line Interface (CLI) with the help of Features Read More »

Learning-MAC-Addresses-infosavvy

Learning MAC Addresses

Learning MAC Addresses Thankfully, the networking staff doesn’t need to type altogether those MAC table entries. Instead, the switches do their second main function: to learn the MAC addresses and interfaces to place into its address table. With an entire MAC address table, the switch can make accurate forwarding and filtering decisions as just discussed. Switches build the address table by listening to incoming frames and examining the source MAC address within the frame. If …

Learning MAC Addresses Read More »

Verifying and Analyzing Ethernet Switching

Verifying and Analyzing Ethernet Switching A Cisco Catalyst switch comes from the factory able to switch frames. All you’ve got to do is connect the facility cable, connect the Ethernet cables, and therefore the switch starts switching incoming frames. Connect multiple switches together, and that they are able to forward frames between the switches also . and therefore the big reason behind this default behavior has to do with the default settings on the switches. Cisco Catalyst switches …

Verifying and Analyzing Ethernet Switching Read More »