Category: Networking Topics

IP Addresses (Version 4)

Did you know there are two versions of IP addresses? There are Internet Protocol version 4 (IPv4) addresses and  Internet Protocol version 6 (IPv6) addresses. In this post, I'll discuss IPv4 addresses. Every device connected to a network, such as the Internet or your home network, is given an IP address. An IP address is ...

Methods of Authentication: PPP, AAA, and EAP

How do we authenticate when we login to another device or an application? It's much more than just entering a username and password, right? Well, there are actually many ways to authenticate! I'll discuss some of the main ones we use and what goes on behind the scenes. Point-to-Point Protocols (PPP) If you're familiar with ...

How Hackers Decrypt Your HTTPS session Using SSL Stripping

I've made quite a few posts on http and https, so this will be the last one for a while. If you've been following these recent posts, I mentioned that even https is not 100 percent secure. Albeit, it is very secure in that it will keep us protected most of the time; however, there ...

Decrypting HTTPS Traffic

Hypertext Transfer Protocol over SSL (https)  is pretty decent security. This is because https uses the Secure Sockets Layer (SSL) encryption scheme to pass keys between two parties over the Internet. These days, however, most of our Web servers are utilizing Transport Layer Security (TLS 1.2), which is an updated version of SSL 3.0. Therefore, ...

How Does HTTPS Work? The TLS Handshake Explained

http is inherently vulnerable to MitM attacks because client-server communication is transmitted in plaintext over the Internet. This makes http sessions vulnerable to MitM, Session Hijacking, and other dangerous attacks. To remediate this vulnerability, security researchers created https, which stands for Hypertext Transfer Protocol over SSL encryption. Note: Since 2008, we've been using TLS 1.2, ...