network

Rogue-DHCP-Server-Attack-infosavvy

Rogue DHCP Server Attack

Rogue DHCP Server Attack in an addition to DHCP starvation attacks, when attacker can perform MITM attacks such as sniffing, An attacker who succeeds in exhausting the DHCP Server’s IP address space can found out a Rogue DHCP Server on the network which isn’t under the control of the network administrator. The Rogue DHCP server impersonates a legitimate server and offers IP addresses and other network information to other clients within the network, acting itself …

Rogue DHCP Server Attack Read More »

Everything-You-Need-To-Know-About-Sniffing – Part-2

Everything You Need To Know About Sniffing – Part 2

Everything You Need To Know About Sniffing – Part 2 in this Sniffing article you will learn about Protocols vulnerable, Hardware Protocol Analyzers, Wiretapping and its methods, Types of Wiretapping and Lawful Interception Protocols vulnerable to Sniffing. Vulnerable to sniffing The following protocols are vulnerable to sniffing. The most reason for vulnerable to Sniffing these protocols is to accumulate passwords: 1. Telnet and Rlogin Telnet may be a protocol used for communicating with a remote …

Everything You Need To Know About Sniffing – Part 2 Read More »

Everything-You-Need-To-Know-About-Sniffing – Part-1

Everything You Need To Know About Sniffing – Part 1

Everything You Need To Know About Sniffing – Part 1 in this article you will learn about network sniffing, passive sniffing, active sniffing and different types of sniffing techniques. We will also consider a scenario wherein how attackers hacks network using sniffers. What is a sniffer in hacking? This section describes network sniffing and threats, how a sniffer works, active and passive sniffing, how an attacker hacks a network using sniffers, protocols susceptible to sniffing, …

Everything You Need To Know About Sniffing – Part 1 Read More »

What-is-Pyramid-of-Pain-?-&-It’s-types

What is Pyramid of Pain ? & It’s types

Pyramid of Pain & It’s types is all loCs are not created with the same value as some hold much more importance in comparison to other loCs. Pyramid of pain represents the types of indicators that the analyst must look out to detect the activities of an adversary as well as the amount of pain that the adversary needs to adapt to pivot and continue with the attack even when the indicators at each level …

What is Pyramid of Pain ? & It’s types Read More »

adversary-activity-identification

Adversary activity Identification

Adversary activity Identification behavioral involves the activity identification of common ways or techniques followed by an soul to launch attacks to penetrate an organization’s network. Activity Identification offers an insight to the protection analysts on coming threats and exploits .It helps them in coming up with the network security infrastructure and adapting numerous security procedures as hindrance against varied cyber-attacks. Also Read:- Top DNS Interrogation Tools Given below area unit a number of the behaviors …

Adversary activity Identification Read More »

generation-of-threat-intelligence

Generation of Threat Intelligence

Threat Intelligence Generation of Threat intelligence signifies the mix of data description potential threats and also the correct knowledge and understanding of organization’s network structure, operations, and activities. It’s usually described by loCs or threat feeds, which give evidence-based data concerning associate organization’s distinctive threat landscape. To get this evidence-based data that’s employed by network defenders, the Generation of Threat Intelligence feeds that contain data on the techniques and indicators ought to be contextualized by …

Generation of Threat Intelligence Read More »

Threat-Life-cycle

Advanced Persistent Threat Life-cycle

Threat Life-cycle Advanced Persistent Threat Life-cycle landscape, organizations ought to concentrate a lot of on AP threat life-cycle. Advanced persistent threats could target organization’s IT assets, money assets, holding, and name. The ordinarily used security and defensive controls won’t do to stop and defend from such attacks. Attackers behind such attacks adapt their TTPs supported the vulnerabilities and security posture of the target organization. It helps attackers evade the protection controls of the target organization. …

Advanced Persistent Threat Life-cycle Read More »

Network-Security-Controls

Network Security Controls

Network Security Controls are used to ensure the confidentiality, integrity, and availability of the network services. These security controls are either technical or administrative safeguards implemented to minimize the security risk. To reduce the risk of a network being compromised, an adequate network security requires implementing a proper combination of network security controls. These network security controls include: Access Control Identification Authentication Authorization Accounting Cryptography Security Policy These controls help organizations with implementing strategies for …

Network Security Controls Read More »

Information-Security-of-Threat

Information Security of Threat

Information Security of Threat and a vulnerability are not one and also the same. Security of Threat may be a person or event that has the potential for impacting a valuable resource in a very negative manner. A vulnerability is that quality of a resource or its environment that enables the threat to be complete. AN armed robber is AN example of a threat. A bank teller is AN example of a valuable resource which …

Information Security of Threat Read More »

What-is-Incident-Management?

What is Incident Management?

Incident Management Incident management is a set of defined processes to identify, analyze, prioritize, and resolve security incidents to restore the system to normal service operations as soon as possible, and prevent further recurrence of the incident. It involves not only responding to incidents, but also triggering alerts to prevent potential risks and threats. Security administrator must identify software that is open to attacks before someone takes advantage of the vulnerabilities. IT incident management is …

What is Incident Management? Read More »