Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Server Message Block & Simple Network Management ProtocolThe Server Message Block (SMB) is one of the most impenetrable communication protocols which is essential for smooth functioning of the…Sep 11Sep 11
Audrey's Blog & ViewsLearning Networks with Linux: BasicsIf you want to be successful as a white hat hacker, mastering networks is an essential skill. For a starter, let us here review some basic…Apr 91Apr 91
Audrey's Blog & ViewsLearning Networks with Linux: TCP/IP protocolsYou will have a great advantage if you understand very well the anatomy and essentials of Transmission Control Protocol (TCP) and Internet…Apr 101Apr 101
Audrey's Blog & ViewsLearning Networks with Linux: Network topologies and OSI modelNetwork is basically a connection among devices whose physical layout and configuration define the topology in order to optimize the…Apr 162Apr 162
Audrey's Blog & ViewsLearning Networks with Linux: Network analysisIn addition to widely used tools such as ifconfig, iwconfig, and ping, let us familiarize ourselves with other network tools in Linux.May 31May 31
Audrey's Blog & ViewsLearning Networks with Linux: Network traffic analyzer “tcpdump”Let us take a look into the two common sniffer tools, i.e., tcpdump and wireshark. In this post, we will focus on the tcpdump while the…May 41May 41
Audrey's Blog & ViewsLearning Networks with Linux: Standard GUI network sniffer “wireshark”The wireshark is analogous to tcpdump but comes with a graphical front-end, integrated sorting and filtering options, and has become a…May 251May 251
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: FirewallsLet us now think about how to protect the network. As the name metaphorically suggests, firewalls can be crucial measures for a secure…May 251May 251
Audrey's Blog & ViewsLearning Networks with Linux: Wi-Fi IEEE 802.11 (part I)Everyone in modern digital age can be susceptible to being hacked due to prevalent use of wireless techniques, e.g, Wi-Fi (internet)…Jun 191Jun 191
Audrey's Blog & ViewsLearning Networks with Linux: Wi-Fi IEEE 802.11 (part II)The anatomy of Wi-Fi (802.11) protocol is delineated. In the long run, this knowledge will be very useful if one wants to develop the Wi-Fi…Jun 201Jun 201
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Uncovering Hidden Wi-Fi Network Name (SSID)It is a misplaced belief that by hiding the service set identifier, i.e., SSID or simply the Wi-Fi name, your network can remain safe. It…Jun 241Jun 241
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Circumventing MAC Address FilteringA network administrator can limit who can access the Wi-Fi AP (Access Point) with the method called MAC address filtering. One can indeed…Jun 251Jun 251
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Attack on Wi-Fi Protected Setup (WPS)As the majority of people do not like to set up Wi-Fi APs (Access Points), an easy technology for doing so was developed called Wi-Fi…Jun 261Jun 261
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Evil Twin AttackOne of the malicious hacking methods relies upon creating an exactly the same SSID (service set identifier), viz. Wi-Fi name, as the target…Jun 271Jun 271
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Denial of Service (DoS) AttackPreviously, we have seen how one can easily de-authenticate the Wi-Fi users in order to force them to re-authenticate. This is indeed quite…Jun 271Jun 271
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Wi-Fi Hacking without Forced DeauthenticationUp until now, we have only discussed hacking methods that rely on forcing the clients to reconnect to the target Wi-Fi in order to capture…Jun 292Jun 292
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Bluetooth HackingBluetooth is built into numerous gadgets that we use daily, e.g., computers, tablet PCs, smartphones, speakers, just to name a few.Jul 161Jul 161
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Address Resolution Protocol (ARP)Address Resolution Protocol (ARP) is used to assign IP addresses to globally unique MAC addresses on the Ethernet networks.Jul 243Jul 243
Audrey's Blog & ViewsinOSINT TeamLearning Networks with Linux: Simple Mail Transfer Protocol (SMTP)In the digital age, it is very difficult to live without emails. Indeed, the email has become one of the most important internet services.Aug 161Aug 161