Perform MSSQL Forensics

Perform MSSQL Forensics in this SQL server is a Relational Database Management System and is being widely adopted by various organizations to store data associated with the applications. This includes sensitive data related to the web application and users’ accounts in the web application. MSSQL forensics take action when a security incident has occurred and detection and analysis of the malicious activities performed by criminals over the SQL database file are required. A forensic investigator …

Perform MSSQL Forensics Read More »


Investigation of Network Traffic

Investigation of Network Traffic in this Network forensics are often defined as sniffing, recording, acquisition, and analysis of the network traffic and event logs so as to research a network security incident. It allows investigator to examine network traffic and logs to spot and locate the attacking system. Devices connected to network still proliferate; computers, smartphones, tablets etc. because the number of attacks against networked systems grow, the importance of network forensics has increased and …

Investigation of Network Traffic Read More »


What are the LAN Switching Concepts

LAN Switching Concepts A modern Ethernet LAN connects user devices also as servers into some switches, with the switches then connecting to every other, sometimes during a design like Figure 7-1. a part of the LAN, called a campus LAN, supports the end user population as shown on the left of the figure. user devices connect to LAN switches, which in turn connect to other switches so that a path exists to the rest of …

What are the LAN Switching Concepts Read More »

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2) in this article you will learn different types of EC2 Services like AWS Systems Manager, Placement Groups, AWS Elastic Beanstalk and Amazon Elastic Container Service and AWS Far gate etc. EC2-Related Services This section will briefly introduce you to a few more EC2 features. Some of these features won’t necessarily play a large role in the solutions architect exam but could definitely come in handy for you in your …

Services Related Elastic Compute Cloud (EC2) Read More »


Introduction of Amazon Elastic Compute Cloud (EC2)

Introduction of Amazon Elastic Compute Cloud (EC2) in this blog You will learn EC2 It’s an Amazon Elastic Compute Cloud and will explore the tools and practices wont to fully leverage the ability of the EC2 ecosystem. Amazon Elastic Compute Cloud (EC2) The ultimate focus of a standard data centre/server room is its precious servers. But, to create those servers useful, you’ll got to add racks, power supplies, cabling, switches, firewalls, and cooling. AWS’s Elastic …

Introduction of Amazon Elastic Compute Cloud (EC2) Read More »

Introduction to Cloud Computing and AWS

You will learn into this regarding cloud computing and their six advantages as well as Introduction to Cloud Computing and AWS types of cloud computing in detail . What is Cloud Computing? Cloud computing is that the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the web with pay-as-you-go pricing. Whether you’re running applications that share photos to many mobile users or you’re supporting the …

Introduction to Cloud Computing and AWS Read More »

Ways To Learn Finding Default Content Of Web Server Effectively-infosavvy

Ways To Learn Finding Default Content Of Web Server Effectively

Finding Default Credentials of a Web Server Ways To Learn Finding Default Content Of Web Server Effectively is the admins or security personnel use administrative interfaces to securely configure, manage, and monitor web application servers. Many web server administrative interfaces are publically accessible and are located within the web root directory. Often these administrative interface credentials aren’t properly configured and remain set to default. Attackers attempt to identify the running application interface of the target web server …

Ways To Learn Finding Default Content Of Web Server Effectively Read More »


Web Server Attacks

The Web Server Attacks which is an attacker can use many techniques to compromise a web server such as DoS/DDoS, DNS server hijacking, DNS amplification, directory traversal, Man-in-the-Middle (MITM)/sniffing, phishing, website defacement, web server misconfiguration, HTTP response splitting, web cache poisoning, SSH brute force, web server password cracking, and so on. This section describes these possible attacks in detail. Web Server Attack Module is part of Certified Ethical Hacker training at Infosavvy – We look at …

Web Server Attacks Read More »


DHCP Request/Reply Messages

DHCP DHCP Request/Reply Messages a device that already has an IP address can use the simple request/reply exchange Message to get other configuration parameters from a DHCP server. When the DHCP client receives a DHCP offer, the client immediately responds by sending back a DHCP request packet. Devices that aren’t using DHCP to accumulate IP addresses can still utilize DHCP’s other configuration capabilities. A client can broadcast a DHCP INFORM message to request that any …

DHCP Request/Reply Messages Read More »


How Dynamic Host Configuration Protocol (DHCP) Works

Dynamic Host Configuration Protocol How Dynamic Host Configuration Protocol (DHCP) Works is a client/server protocol that gives an IP address to an IP host. additionally, to the IP address, the DHCP server also provides configuration-related information like the default gateway and subnet mask. When a Dynamic Host Configuration Protocol client device boots up, it participates in traffic broadcasting. DHCP can assign IP configuration to hosts connecting to a network. The distribution of IP configuration to …

How Dynamic Host Configuration Protocol (DHCP) Works Read More »