Network Hacking

Analyzing-Router-Logs-in-Network-Forensic-Investigation

Analyzing Router Logs in Network Forensic Investigation

Analyzing Router Logs in Network Forensic Investigation, in this the investigator collects the logs of a router to examine and determine the details such as IP addresses and the protocols. Redirection of the logs to syslog server is done in the following mariner: #config terminal Logging 192.168.1.1 During any network hacking, or unauthorized access scenarios, all the logs pertaining to the attack will be stored in the compromised device, which may be the router/switch, database, IDS, …

Analyzing Router Logs in Network Forensic Investigation Read More »

Ethical-hacking

What is Ethical Hacking? & Types of Hacking

Ethical hacking is the practice of employing computer and network skills in order to assist organizations in testing their network security Ethical hacking for possible loopholes and vulnerabilities. White Hats are the individuals or experts who perform ethical hacking. Nowadays, most organizations are hiring White Hats to assist them in enhancing their cyber security. They perform hacking in ethical ways, with the permission of the network/system owner and without the intention to cause harm. Ethical …

What is Ethical Hacking? & Types of Hacking Read More »