Thursday, August 13, 2020

Network Penetration testing

Network Penetration testing determines vulnerabilities on the network posture by discovering Open ports,Live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Trouble shooting services and to calibrate firewall rules. Let's...

ICMP Types and Codes

Control messages Control messages Type Code Status Description 0 Echo 0 Echo reply (used to ping) 1 and 2 unassigned Reserved 3 – Destination Unreachable 0 Destination network unreachable 1 Destination host unreachable 2 Destination protocol unreachable 3 Destination port unreachable 4 Fragmentation required, and DF flag set 5 Source route failed 6 Destination network unknown 7 Destination host unknown 8 Source host isolated 9 Network administratively prohibited 10 Host administratively prohibited 11 Network unreachable for...
Security Incident and Event management

Security Incident and Event management

Security Incident and Event management SIEM implement to monitoring the Security Events from Endpoints, Intrusion detection system, VPN's, firewalls and more. Focusing on detecting the network activities and prevent all the 7...
malware detection

Canada’s Intelligence Agency Releases Malware Detection and Analysis tool for Public

Communications Security Establishment (CSE) released malware detection and analysis tool(Assemblyline) for public use.This tool was developed within CSE’s Cyber Defence program to identify and analyze malicious files as they are received. The release of Assemblyline is an opportunity for the...

Researchers Find Backdoor Account in 80 Different “SONY” IP...

  Researchers in Austria have unearthed a pair of backdoor accounts in more than 80 different IP camera models made by Sony Corp.     Separately, Israeli security experts have discovered trivially exploitable weaknesses in nearly a half-million white-labeled IP camera models that are not currently...
ethicalhackersacademy