The OSI Model & TCP/IP Model

The Open Systems Interconnection (OSI) model is a generic reference to understanding how computers communicate with each other. It's not meant to be an exact science, but rather a guide to help us visualize what happens during node-to-node communication. I once made a post on the OSI model before, but it was lacking detail. There... Continue Reading →

How Does DHCP Work?

Dynamic Host Configuration Protocol, or DHCP, is used to provide quick and centralized management of IP addresses and other TCP/IP settings on your network. These are things like host IP address, subnet mask, DNS settings, default gateway address, and so on (I call these "IP configuration settings"). When you power on your computer, a DHCP... Continue Reading →

Firewalls: A Fundamental Introduction

The defense in-depth design is a security philosophy that proposes we protect our assets and networks with multiple levels of security. The idea is not strictly limited to technical security controls, as management and operational controls have their rightful place in the defense in-depth approach. However, many aspiring and enthusiastic young learners falsely attribute the... Continue Reading →

Volkswagen Golf GTE And Audi3 Sportback e-tron Car Models Vulnerable to Remote Hacking

Hacking vehicles isn't anything new. Over recent years, researchers have demonstrated through proof-of-concept experiments that many popular car models can be hacked by exploiting carefully selected vulnerabilities for a particular system integrated into the vehicle. Just ask Ford, Jeep, Nissan, and Toyota. Some of these vehicles can be remotely turned off; some of them can... Continue Reading →

PenTest Edition: Cracking Wi-Fi Passwords with Aircrack-ng

Aircrack-ng is a suite of wireless penetration testing tools used to assess the security of Wi-Fi networks, specifically through various monitoring, attacking, testing, and cracking methods that you'll learn here. Aircrack-ng is compatible with various IEEE 802.11 standards, which is great, but it will only work if you're wireless NIC supports "monitor" mode. If you... Continue Reading →

FISMA Compliance & NIST SP 800-37 (Rev. 1)

The "Federal Information Security Management Act," or "FISMA," is a U.S. federal law that arose from the E-Government Act of 2002. In this act, the U.S. government underlined the significance of  improving the management of electronic government services and processes. FISMA provides the framework for organizations to develop and maintain the minimum security goals for... Continue Reading →

Up ↑