Binh LamPractical Guide to Nmap Scanning for Network Security Assessment and DDoS Risk EvaluationNmap, or Network Mapper, is a powerful open-source tool for network scanning and security auditing. With Nmap, you can detect devices on a…May 27, 2023May 27, 2023
Binh LamHow Man-in-the-Middle Attacks Can Exploit Route Hijacks and LeaksA Man-in-the-Middle (MITM) attack is a type of cyber attack where an attacker intercepts and alters communications between two parties who…Feb 27, 2023Feb 27, 2023
Binh LamPython Scripting for Effective Network Connection Monitoring in CybersecurityIntroductionFeb 15, 2023Feb 15, 2023
Binh LamA Practical Guide to Using WHOIS, nslookup, and dig for DNS Investigations, Passive Reconnaissance.Before the dawn of networks and computer systems, in the Art of War, Sun Tzu taught, “If you know the enemy and know yourself, your victory…Feb 15, 2023Feb 15, 2023
Binh LamUncovering the Mystery Behind Shortened URLs: A Guide to Analyzing URLs with PythonShortened URLs can pose a serious security risk to users. Scammers and cyber criminals can use URL shortening to hide the true destination…Feb 5, 2023Feb 5, 2023
Binh Lam“Silly” code is disappeared in Service Provider?I am working on designing a large Service Provider Transit network, and when it comes to define “network site format” standard, out of my…Aug 8, 2022Aug 8, 2022
Binh LamYear 2022 — Current stage of Secure Internet Routing, why route hijack is still so successful?Because two simple reasons:Jul 7, 2022Jul 7, 2022
Binh LamDon’t *amplify* a route leak without knowing! Be part of a solution to prevent route leaks.Let’s deep dive into a route leak case detected.Jun 19, 2022Jun 19, 2022
Binh LamRouting security — Making internet a safer and cleaner place to live, work and play.Let’s analyze a recent route hijack event detected by bgpstream:Jun 9, 2022Jun 9, 2022