<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thecybersecurityman.com/2018/06/08/how-to-subnet-then-how-to-subnet-the-correct-way-using-vlsms/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/subnet-featured-image.png</image:loc><image:title>subnet featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/vlsm-table.png</image:loc><image:title>VLSM Table</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/new-vlsm-network.png</image:loc><image:title>New VLSM network</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/new-network-11.png</image:loc><image:title>New Network 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/new-network-1.png</image:loc><image:title>New Network 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/class-c-networks1.png</image:loc><image:title>Class C Networks</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/vlsm-11.png</image:loc><image:title>VLSM 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/new-network1.png</image:loc><image:title>New Network</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/giant-broadcast-domain7.png</image:loc><image:title>giant broadcast domain</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/vlsm-1.png</image:loc><image:title>VLSM 1</image:title></image:image><lastmod>2021-04-17T23:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/about/</loc><lastmod>2021-04-14T14:58:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersecurityman.com/2018/10/01/pentest-edition-sql-injection-attacks-using-both-burp-suite-and-sqlmap/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/featured.png</image:loc><image:title>featured</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/burp-suite.png</image:loc><image:title>burp suite</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/passwords-3.png</image:loc><image:title>passwords 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/passwords-2.png</image:loc><image:title>passwords 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/wordlists.png</image:loc><image:title>wordlists</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/passwords-1.png</image:loc><image:title>passwords 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/columns.png</image:loc><image:title>columns</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/tables.png</image:loc><image:title>tables</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/dbs.png</image:loc><image:title>dbs</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/10/sqlmap-command-5.png</image:loc><image:title>sqlmap command 5</image:title></image:image><lastmod>2021-04-14T14:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/15/pentest-edition-create-evil-twin-using-dnsmasq-and-hostapd/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin-fea.png</image:loc><image:title>evil twin fea</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/network.png</image:loc><image:title>network</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-query-1.png</image:loc><image:title>dnsmasq query 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dhcp-ip.jpg</image:loc><image:title>dhcp ip</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-dhcp-info.png</image:loc><image:title>dnsmasq dhcp info</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/hostapd-authenticated.png</image:loc><image:title>hostapd authenticated</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/password.png</image:loc><image:title>password</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/network-settings.png</image:loc><image:title>network settings</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-query-2.png</image:loc><image:title>dnsmasq query 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/hostapd-conf-file.jpg</image:loc><image:title>hostapd.conf file</image:title></image:image><lastmod>2021-04-14T14:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/11/creating-an-evil-twin-or-fake-access-point-using-aircrack-ng-and-dnsmasq-part-2-the-attack/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/facebookstuff1.png</image:loc><image:title>facebookstuff</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/free-candy.jpg</image:loc><image:title>free candy</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin-featured-image-2.png</image:loc><image:title>Evil Twin Featured image 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/networks-2.png</image:loc><image:title>networks 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/iwconfig-increase-signal.png</image:loc><image:title>iwconfig increase signal</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/at01.png</image:loc><image:title>at0</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dhcp-information-2.png</image:loc><image:title>DHCP information 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dns-log-information.png</image:loc><image:title>dns log information</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/facebookstuff.png</image:loc><image:title>facebookstuff</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/iphone-network-settings-2.png</image:loc><image:title>iPhone network settings 2</image:title></image:image><lastmod>2021-04-14T14:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/11/pentest-edition-creating-an-evil-twin-or-fake-access-point-using-aircrack-ng-and-dnsmasq-part-1-setup/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin-featured-image-1.png</image:loc><image:title>Evil Twin Featured image 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-conf-file1.png</image:loc><image:title>dnsmasq.conf file</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/buy-best-wireless-network-adapter-for-wi-fi-hacking-2017-1280x600.jpg</image:loc><image:title>buy-best-wireless-network-adapter-for-wi-fi-hacking-2017.1280x600</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin.png</image:loc><image:title>Evil Twin</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin-image.png</image:loc><image:title>evil twin image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/fake-ap-image.png</image:loc><image:title>Fake AP Image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-conf-file.png</image:loc><image:title>dnsmasq.conf file</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/evil-twin-folder.png</image:loc><image:title>evil twin folder</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-5.png</image:loc><image:title>dnsmasq 5</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/dnsmasq-4.png</image:loc><image:title>dnsmasq 4</image:title></image:image><lastmod>2021-04-14T14:37:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/08/pentest-edition-evade-detection-using-tor-and-proxy-chains/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-featured-image.png</image:loc><image:title>proxychains featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-featured-image.jpg</image:loc><image:title>proxychains featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-dns-change.png</image:loc><image:title>proxychains dns change</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-dns-leaks.png</image:loc><image:title>proxychains dns leaks</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-dns-leak-test-results.png</image:loc><image:title>proxychains dns leak test results</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-dns-leak-diagram.png</image:loc><image:title>proxychains dns leak diagram</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxy_chain.jpg</image:loc><image:title>proxy_chain</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-dnsleaktest-ip.png</image:loc><image:title>proxychains dnsleaktest ip</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-tor-nmap1.png</image:loc><image:title>proxychains tor nmap</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/proxychains-tor-nmap.png</image:loc><image:title>proxychains tor nmap</image:title></image:image><lastmod>2021-04-14T14:34:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/01/pentest-edition-using-theharvester-to-gather-e-mail-accounts-subdomains-hosts-linkedin-users-banner-information-and-more/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-featured-image.png</image:loc><image:title>theharvester featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-google-bruteforce.png</image:loc><image:title>theharvester google bruteforce</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-google-brute-force-command.png</image:loc><image:title>theharvester google brute force command</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-linkedin-results.png</image:loc><image:title>theharvester linkedin results</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-linkedin-command.png</image:loc><image:title>theharvester linkedin command</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-linkedin1.png</image:loc><image:title>theharvester linkedin</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-emails-2.png</image:loc><image:title>theharvester emails 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-guardian-command.png</image:loc><image:title>theharvester guardian command</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-bing-results.png</image:loc><image:title>theharvester bing results</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/theharvester-bing-1.png</image:loc><image:title>theharvester bing 1</image:title></image:image><lastmod>2021-04-14T14:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/28/pentest-edition-cracking-strong-wpa2-wi-fi-passwords-using-fluxion/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-featured-image.png</image:loc><image:title>fluxion featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion.png</image:loc><image:title>fluxion</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-deauth-all.png</image:loc><image:title>fluxion deauth all</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-wifi-information.png</image:loc><image:title>fluxion wifi information</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-dns.png</image:loc><image:title>fluxion dns</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-dhcp.png</image:loc><image:title>fluxion dhcp</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-password-2.jpg</image:loc><image:title>fluxion password 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-portal-2.png</image:loc><image:title>fluxion portal 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-portal-3.png</image:loc><image:title>fluxion portal 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fluxion-attack-2.png</image:loc><image:title>fluxion attack 2</image:title></image:image><lastmod>2021-04-14T14:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/26/capture-images-that-network-users-are-looking-at-using-driftnet-and-websploit/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-featured-image.png</image:loc><image:title>wsf featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-error.png</image:loc><image:title>wsf error</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-run-2.png</image:loc><image:title>wsf run 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-run-1.png</image:loc><image:title>wsf run 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-show-options-2.png</image:loc><image:title>wsf show options 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-show-options-1.png</image:loc><image:title>wsf show options 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-modules.png</image:loc><image:title>wsf modules</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-mode.png</image:loc><image:title>wsf mode</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wsf-ifconfig.png</image:loc><image:title>wsf ifconfig</image:title></image:image><lastmod>2021-04-14T14:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/14/pentest-edition-sniffing-url-names-web-traffic-and-passwords-with-mitmf-and-urlsnarf/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/urlsnarf-31.png</image:loc><image:title>urlsnarf 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/mitmf-urlsnarf.png</image:loc><image:title>mitmf urlsnarf</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/mitmf-3.png</image:loc><image:title>mitmf 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/urlsnarf-3.png</image:loc><image:title>urlsnarf 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/urlsnarf-2.png</image:loc><image:title>urlsnarf 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/mitmf-2.png</image:loc><image:title>mitmf 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/urlsnarf-1.png</image:loc><image:title>urlsnarf 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/mitmf-1.png</image:loc><image:title>mitmf 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/ifconfig-1.png</image:loc><image:title>ifconfig 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/nmap-scan2.png</image:loc><image:title>nmap scan</image:title></image:image><lastmod>2021-04-14T14:15:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/09/your-live-security-camera-footage-may-be-broadcasted-online-and-you-wouldnt-know/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-featured-image.png</image:loc><image:title>insecam featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-featured-image.jpg</image:loc><image:title>insecam featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-5.gif</image:loc><image:title>insecam gif 5</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-7.jpg</image:loc><image:title>insecam gif 7</image:title><image:caption>A bedroom in California. Reprinted from "Insecam exposes live feeds of surveillance cameras," by Law, J., 2014</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-6.jpg</image:loc><image:title>insecam gif 6</image:title><image:caption>A family room in Australia. Reprinted from "Live security camera footage of private moments stokes privacy fears," by Mitchelson, A., 2018.</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-4.gif</image:loc><image:title>insecam gif 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-3.gif</image:loc><image:title>insecam gif 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-2.gif</image:loc><image:title>insecam gif 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-gif-1.gif</image:loc><image:title>insecam gif 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/insecam-faq.png</image:loc><image:title>insecam faq</image:title></image:image><lastmod>2021-04-14T14:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/30/session-hijacking-attacks/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/session-hijacking.png</image:loc><image:title>session hijacking</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/sessionhijacking.jpg</image:loc><image:title>SessionHijacking</image:title></image:image><lastmod>2021-04-14T14:08:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/24/pentest-edition-wi-fi-hacking-with-wifite/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-logo-2.png</image:loc><image:title>Wifite logo 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-wps.png</image:loc><image:title>Wifite WPS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-wep.png</image:loc><image:title>Wifite WEP</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-failed.png</image:loc><image:title>Wifite failed</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-captured.png</image:loc><image:title>wifite captured</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-listening.png</image:loc><image:title>Wifite listening</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-select.png</image:loc><image:title>Wifite select</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifite-network-list.png</image:loc><image:title>Wifite network list</image:title></image:image><lastmod>2021-04-14T14:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/11/pentest-edition-cracking-wep-wps-wpa-and-wpa2-wi-fi-networks-with-the-fern-wi-fi-cracker-tool/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-featured-image.png</image:loc><image:title>fwc featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-password.png</image:loc><image:title>fwc password</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-airodump.png</image:loc><image:title>fwc airodump</image:title><image:caption>Capturing the handshake.</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-aireplay.png</image:loc><image:title>fwc aireplay</image:title><image:caption>airodump-ng deuath frames to the device</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-deauth-2.png</image:loc><image:title>fwc deauth 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-deauth.png</image:loc><image:title>fwc deauth</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-device-list.png</image:loc><image:title>fwc device list</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-attack-panel.png</image:loc><image:title>fwc attack panel</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-choose-scan.png</image:loc><image:title>fwc choose scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fwc-devices.png</image:loc><image:title>fwc devices</image:title></image:image><lastmod>2021-04-14T14:04:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/01/refrigerators-are-hacking-people/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fridge-1.jpg</image:loc><image:title>fridge 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/fridges.jpg</image:loc><image:title>fridges</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/fridge-hack.png</image:loc><image:title>fridge hack</image:title></image:image><lastmod>2021-04-14T14:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/22/my-favorite-wi-fi-hacking-tools-2018/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/my-favorite-wi-fi-hacking-tools.png</image:loc><image:title>My favorite Wi-Fi hacking Tools</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/aircrack-ng-2.jpg</image:loc><image:title>aircrack-ng 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/aircrack-ng.gif</image:loc><image:title>aircrack-ng</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/airmonbase.jpg</image:loc><image:title>airmonbase</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/wireshark-5_x98k.png</image:loc><image:title>wireshark-5_x98k</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cain.png</image:loc><image:title>CAIN</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/angry-ip-scanner.png</image:loc><image:title>angry IP scanner</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/kismet-3.jpg</image:loc><image:title>kismet 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/kismet-1.jpg</image:loc><image:title>kismet 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/kismet-2.jpg</image:loc><image:title>kismet 2</image:title></image:image><lastmod>2021-04-14T14:01:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/06/creating-a-man-in-the-middle-attack-using-cain-abel-tutorial/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/mitm-image.jpg</image:loc><image:title>mitm image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/arp-example-2.png</image:loc><image:title>arp example 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/arp-example.png</image:loc><image:title>arp example</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/mitmg.png</image:loc><image:title>mitmg</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/arp-table-1.png</image:loc><image:title>arp table 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/poisoning.png</image:loc><image:title>poisoning</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/arp-poison.png</image:loc><image:title>ARP poison</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/scan-results.png</image:loc><image:title>scan results</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/mac-address-scanner.png</image:loc><image:title>mac address scanner</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sniffer.png</image:loc><image:title>sniffer</image:title></image:image><lastmod>2021-04-14T13:54:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/05/stealing-facebook-passwords/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/facebook-630x426.jpg</image:loc><image:title>facebook-630x426</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ghost_phisher.png</image:loc><image:title>ghost_phisher</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/cainabel-hacking-arp6.jpg</image:loc><image:title>cain&amp;abel hacking arp6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/mitm.png</image:loc><image:title>mitm</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sslstrip-running.jpg</image:loc><image:title>sslstrip running</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/cain-abel.jpg</image:loc><image:title>cain-abel</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/75.jpg</image:loc><image:title>75</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/hosts.png</image:loc><image:title>hosts</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/owasp-man_in_the_middle.jpg</image:loc><image:title>owasp-man_in_the_middle</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/arp-table.jpg</image:loc><image:title>arp table</image:title></image:image><lastmod>2021-04-14T13:53:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/07/stealing-your-personal-information-on-a-wireless-hot-spot-is-painfully-easy/</loc><lastmod>2021-04-14T13:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/03/performing-a-man-in-the-middle-attack-on-a-wireless-network-using-cain-abel-and-wireshark-without-monitor-mode/</loc><lastmod>2021-04-14T13:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/02/cracking-wi-fi-passwords-with-aircrack-ng/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-featured-image1.png</image:loc><image:title>aircrack featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-featured-image.png</image:loc><image:title>aircrack featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-airodump-ap-11.png</image:loc><image:title>aircrack airodump ap 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-wiki.png</image:loc><image:title>aircrack wiki</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-key.png</image:loc><image:title>aircrack key</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-deauth-wireshark.png</image:loc><image:title>aircrack deauth wireshark</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-airodump-ap-21.png</image:loc><image:title>aircrack airodump ap 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-airodump-ap-2.png</image:loc><image:title>aircrack airodump ap 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-deauth.png</image:loc><image:title>aircrack deauth</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/aircrack-airodump-ap-1.png</image:loc><image:title>aircrack airodump ap 1</image:title></image:image><lastmod>2021-04-14T13:38:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2021/02/15/a-bug-bounty-testers-guide-to-detecting-xss-vulnerabilities/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2021/02/0920b-1yurkbr6yroylcgpka9kdra.png</image:loc><image:title>1*yuRkBR6YroYLCGpka9KdRA</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2021/02/xss-cover.png</image:loc><image:title>xss cover</image:title></image:image><lastmod>2021-05-04T16:26:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2020/12/03/a-bug-bounty-testers-guide-to-detecting-sql-injection-vulnerabilities/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2020/12/bug-bounty-sql-injection.png</image:loc><image:title>bug bounty sql injection</image:title></image:image><lastmod>2020-12-04T19:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/web-application-security/</loc><lastmod>2020-12-02T22:43:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersecurityman.com/contact/</loc><lastmod>2020-12-02T22:31:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersecurityman.com/2019/10/23/sql-injection-prevention-and-mitigation/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2019/10/sql_injection_cover.png</image:loc><image:title>SQL_INJECTION_COVER</image:title></image:image><lastmod>2019-10-24T07:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/09/27/pentest-edition-go-from-beginner-to-advanced-with-nmap/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/featured-image.png</image:loc><image:title>featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/t-2.png</image:loc><image:title>T 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/t-1.png</image:loc><image:title>t 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/scripts.png</image:loc><image:title>scripts</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/openvas.png</image:loc><image:title>openvas</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/eternal-blue.png</image:loc><image:title>Eternal Blue</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vulnerabilities-3.png</image:loc><image:title>vulnerabilities 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vulnerabilities-2.png</image:loc><image:title>vulnerabilities 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vulnerabilities-11.png</image:loc><image:title>vulnerabilities 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vulnerabilities-1.png</image:loc><image:title>vulnerabilities 1</image:title></image:image><lastmod>2019-10-23T23:52:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/19/what-is-snort-bonus-how-to-write-snort-rules/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/snort.png</image:loc><image:title>Snort</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/snort-syntax.png</image:loc><image:title>Snort Syntax</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/snort-rule-header-and-options.png</image:loc><image:title>Snort rule header and options</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/how-snort-works.png</image:loc><image:title>How Snort Works</image:title></image:image><lastmod>2018-11-08T06:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/12/your-home-router-could-be-infected-the-destructive-vpnfilter-malware-is-worse-than-we-thought/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/router-reboot-pics-800x600.jpg</image:loc><image:title>router-reboot-pics-800x600</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/home-router.png</image:loc><image:title>home router</image:title></image:image><lastmod>2018-09-29T23:55:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/09/09/the-sony-pictures-entertainment-hack-a-look-at-the-evidence-we-have/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/sony.png</image:loc><image:title>Sony</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/park-3.png</image:loc><image:title>Park 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/park-2.png</image:loc><image:title>Park 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/park-1.png</image:loc><image:title>Park 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/sp-2.png</image:loc><image:title>sp 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/sp-1.png</image:loc><image:title>sp 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vested-interest.jpg</image:loc><image:title>vested interest</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/gop-image.jpg</image:loc><image:title>gop-image</image:title></image:image><lastmod>2018-09-09T22:16:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/09/06/installing-kali-linux-in-vmware-workstation-player-vmware-tools-included/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/kali-feature.png</image:loc><image:title>kali feature</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/customize-hardware1.png</image:loc><image:title>customize hardware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/vmware-tools.png</image:loc><image:title>vmware tools</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/kali.png</image:loc><image:title>kali</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/sda.png</image:loc><image:title>sda</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/boot-loader.png</image:loc><image:title>boot loader</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/http.png</image:loc><image:title>HTTP</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/apt.png</image:loc><image:title>apt</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/installing-system.png</image:loc><image:title>installing system</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/partition-5.png</image:loc><image:title>partition 5</image:title></image:image><lastmod>2018-09-06T17:26:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/09/04/security-researchers-confirm-an-additional-7500-hacked-mikrotik-routers-spying-on-network-traffic/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/routerss.jpg</image:loc><image:title>routerss</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/mikrotik-router-featured-image.png</image:loc><image:title>MikroTik Router featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/mikrotik-infection.png</image:loc><image:title>MikroTik Infection</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/routeros-config.png</image:loc><image:title>RouterOS config</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/winbox.png</image:loc><image:title>Winbox</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/twitter-user.png</image:loc><image:title>Twitter User</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/09/reddit-user.png</image:loc><image:title>Reddit user</image:title></image:image><lastmod>2021-05-03T17:06:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/03/all-wi-fi-networks-are-currently-vulnerable-to-attack/</loc><lastmod>2018-08-30T22:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/30/wireless-networking-understanding-various-wireless-lan-technologies/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-networking.png</image:loc><image:title>Wireless Networking</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/802-11b-router2.jpg</image:loc><image:title>802.11b router</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-nic.gif</image:loc><image:title>wireless NIC</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-nic-1.jpg</image:loc><image:title>wireless NIC 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-router-4.jpg</image:loc><image:title>wireless router 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-router-3.jpg</image:loc><image:title>wireless router 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-router-2.jpg</image:loc><image:title>wireless router 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/wireless-router-1.jpg</image:loc><image:title>wireless router 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/nic6.jpg</image:loc><image:title>NIC6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/nic-71.jpg</image:loc><image:title>NIC 7</image:title></image:image><lastmod>2018-08-30T22:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/25/virtual-local-area-networks-vlans/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/802-1q.png</image:loc><image:title>802.1q</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/vlan-ports.png</image:loc><image:title>VLAN ports</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/intervlan-routing.jpg</image:loc><image:title>intervlan routing</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/trunking2.png</image:loc><image:title>trunking</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/trunking1.png</image:loc><image:title>trunking</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/trunking.png</image:loc><image:title>trunking</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/vlan-topology.png</image:loc><image:title>VLAN topology</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switch-topology.png</image:loc><image:title>switch topology</image:title></image:image><lastmod>2018-08-24T20:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/08/24/vlan-configurations-trunk-links-and-802-1q-encapsulation/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/vlan-featured-image.png</image:loc><image:title>VLAN featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/show-vlan-21.png</image:loc><image:title>Show VLAN 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/vlan-design2.png</image:loc><image:title>VLAN Design</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/default-vlan.png</image:loc><image:title>default vlan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/show-vlan1.png</image:loc><image:title>Show VLAN</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/ivr-configuration.png</image:loc><image:title>IVR configuration</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/ivr.png</image:loc><image:title>IVR</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/router-config2.png</image:loc><image:title>Router config</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/show-vlan-2.png</image:loc><image:title>Show VLAN 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/08/assign-vlan1.png</image:loc><image:title>Assign VLAN</image:title></image:image><lastmod>2018-08-24T19:48:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/07/26/the-need-to-know-encryption-algorithms/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/encryption-featured-image.png</image:loc><image:title>Encryption featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/encryption-algorithms.png</image:loc><image:title>Encryption Algorithms</image:title></image:image><lastmod>2018-07-26T20:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/07/18/an-intermediate-level-discussion-on-network-switches/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/switches-featured-image.png</image:loc><image:title>switches featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/switch-collision-domain.jpg</image:loc><image:title>switch collision domain</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/hub-collision-domain.jpg</image:loc><image:title>hub collision domain</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/hub-based-lans.jpg</image:loc><image:title>hub-based LANs</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/switch-and-hub-collision-domains.jpeg</image:loc><image:title>switch and hub collision domains</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/hubs.gif</image:loc><image:title>hubs</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/hub.gif</image:loc><image:title>hub</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/switchport-security-example.png</image:loc><image:title>switchport security example</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/switchport-security-options.png</image:loc><image:title>switchport security options</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/set-console-password.png</image:loc><image:title>Set console password</image:title></image:image><lastmod>2018-07-18T21:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/07/12/pentest-edition-using-shodan-to-locate-internet-connected-devices-webcams-servers-routers-and-more/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-featured-image.png</image:loc><image:title>shodan featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-cisco-2.png</image:loc><image:title>Shodan Cisco 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-cisco-1.png</image:loc><image:title>Shodan Cisco 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-map.png</image:loc><image:title>Shodan map</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-indiannapolis.png</image:loc><image:title>Shodan indiannapolis</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/imb_abc0hd.gif</image:loc><image:title>imb_abc0hd</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/imb_awtsdo.gif</image:loc><image:title>imb_awtsdo</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-search.png</image:loc><image:title>Shodan Search</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-ics.png</image:loc><image:title>Shodan ICS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/shodan-databases.png</image:loc><image:title>Shodan Databases</image:title></image:image><lastmod>2018-07-12T18:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/07/05/the-recent-4g-lte-network-vulnerabilities-and-attacks/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/lte.png</image:loc><image:title>LTE</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/authentication-relay-attack.png</image:loc><image:title>Authentication Relay Attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/detach-attack.png</image:loc><image:title>detach attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/traceability-attack1.png</image:loc><image:title>Traceability attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/traceability-attack.png</image:loc><image:title>Traceability attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/authentication-sync-failure-attack.png</image:loc><image:title>authentication sync failure attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/alter.png</image:loc><image:title>aLTEr</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/web-site-fingerprinting1.png</image:loc><image:title>Web Site Fingerprinting</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/web-site-fingerprinting.png</image:loc><image:title>Web Site Fingerprinting</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/identiy-mapping-attack.png</image:loc><image:title>Identiy Mapping Attack</image:title></image:image><lastmod>2019-02-11T17:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/07/09/timehop-was-hacked-data-breach-exposes-21-million-users/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/timehop-2.jpg</image:loc><image:title>timehop 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/timehop-1.jpg</image:loc><image:title>timehop 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/timehop.png</image:loc><image:title>timehop</image:title></image:image><lastmod>2018-07-09T20:36:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/choose-from-the-categories-above/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/07/categories.jpg</image:loc><image:title>categories</image:title></image:image><lastmod>2018-07-06T17:38:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersecurityman.com/2018/06/27/wi-fi-networks-to-receive-a-massive-security-upgrade-wi-fi-alliance-launches-wpa3/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/googlehome.jpg</image:loc><image:title>googlehome</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wifi-password.jpg</image:loc><image:title>wifi password</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/aircrack-key.png</image:loc><image:title>aircrack key</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wpa3.png</image:loc><image:title>WPA3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wpa3.jpg</image:loc><image:title>Wi-Fi wireless internet router on dark background</image:title><image:caption>Wi-Fi wireless internet router on dark background 3d</image:caption></image:image><lastmod>2018-07-06T16:57:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/25/over-3000-ios-and-android-apps-leak-100-million-user-sensitive-records-via-misconfigured-firebase-backends/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/firebase-featured-image.png</image:loc><image:title>Firebase Featured Image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/fb_db_1.gif</image:loc><image:title>fb_db_1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/json-leak.png</image:loc><image:title>JSON leak</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/json-example.png</image:loc><image:title>JSON example</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/appthority-stats.png</image:loc><image:title>Appthority Stats</image:title></image:image><lastmod>2018-06-25T13:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/20/krack-attacks-key-reinstallation-attacks-that-break-wpa2/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/krack-attack-featured-image.png</image:loc><image:title>KRACK Attack Featured Image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/wpa-4-way-handshake.png</image:loc><image:title>WPA 4-Way Handshake</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/4-way-handshake.png</image:loc><image:title>4-way handshake</image:title></image:image><lastmod>2018-06-21T18:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/12/this-month-in-cybersecurity-news-june-2018/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/cybersecurity-news.png</image:loc><image:title>cybersecurity news</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/vpn-diagram.jpg</image:loc><image:title>vpn diagram</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/baby-monitor.jpg</image:loc><image:title>baby monitor</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/flashplayer-exploit.png</image:loc><image:title>flashplayer exploit</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/facebook-image.jpg</image:loc><image:title>facebook image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/oneplus6.jpeg</image:loc><image:title>OnePlus6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/vpnfilter-malware.png</image:loc><image:title>VPNFilter Malware</image:title></image:image><lastmod>2018-06-12T00:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/06/01/transmission-control-protocol-tcp/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/tcp-image.png</image:loc><image:title>TCP image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/tcp-split-handshake.png</image:loc><image:title>TCP Split Handshake</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/tcp-three-way-handshake.png</image:loc><image:title>TCP Three Way Handshake</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/06/tcpheader.jpg</image:loc><image:title>tcpheader</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/tcpip-stack.png</image:loc><image:title>TCPIP Stack</image:title></image:image><lastmod>2019-04-10T20:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/24/the-osi-model-tcp-ip-model/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/osi-model-featured-image.png</image:loc><image:title>OSI model featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/osi-model1.png</image:loc><image:title>OSI-Model</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/tcpip-model.jpg</image:loc><image:title>TCPIP model</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/ethernet-frame.png</image:loc><image:title>Ethernet frame</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/ip-header.png</image:loc><image:title>ip.header</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/udp-header.gif</image:loc><image:title>udp header</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/tcp.png</image:loc><image:title>tcp</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/multiplexing.png</image:loc><image:title>multiplexing</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/code3.gif</image:loc><image:title>code3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/tcpip-osi.jpg</image:loc><image:title>tcpip osi</image:title></image:image><lastmod>2018-05-24T01:06:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/22/2386/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-featured-image2.png</image:loc><image:title>dhcp featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-31.png</image:loc><image:title>DHCP Step 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-4.png</image:loc><image:title>DHCP Step 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-21.png</image:loc><image:title>DHCP Step 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-11.png</image:loc><image:title>DHCP Step 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-3.png</image:loc><image:title>DHCP Step 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-2.png</image:loc><image:title>DHCP Step 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/dhcp-step-1.png</image:loc><image:title>DHCP Step 1</image:title></image:image><lastmod>2018-05-22T00:44:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/08/firewalls-a-fundamental-introduction/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-featured-image.png</image:loc><image:title>firewall featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-featured-image.jpg</image:loc><image:title>Firewall featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-4.png</image:loc><image:title>firewall 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-3.jpg</image:loc><image:title>firewall 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-2.jpg</image:loc><image:title>firewall 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-1.jpg</image:loc><image:title>firewall 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/application-layer-firewall.png</image:loc><image:title>application layer firewall</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/stateful-firewall-guide.png</image:loc><image:title>stateful firewall guide</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/stateful-firewall.png</image:loc><image:title>stateful firewall</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/firewall-gif-2.gif</image:loc><image:title>firewall gif 2</image:title></image:image><lastmod>2018-05-08T22:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/03/twitter-urges-its-users-to-change-their-password-immediately/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/twitter-featured-image.png</image:loc><image:title>twitter featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/twitter-email1.png</image:loc><image:title>twitter email</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/twitter-email.png</image:loc><image:title>twitter email</image:title></image:image><lastmod>2018-05-03T23:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/05/03/volkswagen-golf-gte-and-audi3-sportback-e-tron-car-models-vulnerable-to-remote-hacking/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/volkswagen-featured-image.png</image:loc><image:title>volkswagen featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/audi-a3-e-tron-rt-2014-14.jpg</image:loc><image:title>audi-a3-e-tron-rt-2014-14</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/golfgteadvance05.jpg</image:loc><image:title>GolfGTEadvance05</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/ivi-system.png</image:loc><image:title>IVI system</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/05/can-buses.png</image:loc><image:title>CAN buses</image:title></image:image><lastmod>2018-05-03T02:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/27/fisma-compliance-nist-sp-800-37-rev-1/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/fisma-featured-image.png</image:loc><image:title>fisma featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ps.png</image:loc><image:title>PS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/sp-800-53.jpg</image:loc><image:title>SP 800-53</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/fips-199.png</image:loc><image:title>FIPS 199</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/sp80037.png</image:loc><image:title>sp80037</image:title></image:image><lastmod>2018-04-30T18:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/30/cabling-the-different-cable-types-seen-on-both-old-and-new-networks-copper-fiber-optic-and-more/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cables1.png</image:loc><image:title>cables</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cables.png</image:loc><image:title>cables</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/db-25.png</image:loc><image:title>DB-25</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/serial-1.png</image:loc><image:title>serial 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/db-9.jpg</image:loc><image:title>DB-9</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/return-loss.jpg</image:loc><image:title>return loss</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/fiber-coupler1.png</image:loc><image:title>fiber coupler</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/fiber-coupler.png</image:loc><image:title>fiber coupler</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/fiber-connector.png</image:loc><image:title>fiber connector</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/fc-connector-2.jpeg</image:loc><image:title>FC Connector 2</image:title></image:image><lastmod>2018-04-30T03:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/14/10-security-frameworks-every-cybersecurity-analyst-should-know/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/framework-image.png</image:loc><image:title>framework image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/sabsa-matrix.png</image:loc><image:title>SABSA matrix</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fips-199.png</image:loc><image:title>FIPS 199</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/sp-800-53.jpg</image:loc><image:title>SP 800-53</image:title></image:image><lastmod>2018-04-27T23:03:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/26/orangeworm-mounting-an-espionage-campaign-against-the-healthcare-sector/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/orange-worm.png</image:loc><image:title>orange worm</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/kwampirs-commands-2.png</image:loc><image:title>Kwampirs commands 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/kwampirs-commands-1.png</image:loc><image:title>Kwampirs commands 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/kwampirs-3.png</image:loc><image:title>Kwampirs 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/kwampirs-2.png</image:loc><image:title>Kwampirs 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/kwampirs-1.png</image:loc><image:title>Kwampirs 1</image:title></image:image><lastmod>2018-04-26T00:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/25/https-the-tls-handshake-using-diffie-hellman-ephemeral/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/google-https.jpg</image:loc><image:title>google-https</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/dhe.png</image:loc><image:title>DHE</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-4.png</image:loc><image:title>ssl step 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-3.png</image:loc><image:title>ssl step 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-2.png</image:loc><image:title>ssl step 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-12.png</image:loc><image:title>ssl step 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-11.png</image:loc><image:title>ssl step 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-step-1.png</image:loc><image:title>ssl step 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/certificate.jpg</image:loc><image:title>certificate</image:title></image:image><lastmod>2018-04-25T23:14:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/22/how-does-https-work/</loc><lastmod>2018-04-25T22:39:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/22/decrypting-https-traffic/</loc><lastmod>2018-04-25T22:27:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/20/kerberos-authentication/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/kerberos.jpg</image:loc><image:title>kerberos</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/referral-ticket.png</image:loc><image:title>referral ticket</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/kerberos-process.png</image:loc><image:title>kerberos process</image:title></image:image><lastmod>2018-04-25T03:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/24/common-network-security-protections/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/network-security.jpg</image:loc><image:title>network security</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/blog-checklist.jpg</image:loc><image:title>blog-checklist</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/cisco-posture-assessment.jpg</image:loc><image:title>Cisco posture assessment</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/time-for-review.jpg</image:loc><image:title>time for review</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/paper.jpg</image:loc><image:title>paper</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/firewall-policy-configuration2.jpg</image:loc><image:title>firewall policy configuration2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nat.png</image:loc><image:title>NAT</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ssl-proxy.png</image:loc><image:title>SSL Proxy</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/proxy-1.png</image:loc><image:title>Proxy (1)</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/hardened.gif</image:loc><image:title>hardened</image:title></image:image><lastmod>2018-04-24T22:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/01/ip-addresses-version-6/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/ipv61.png</image:loc><image:title>ipv6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/ipv6.png</image:loc><image:title>ipv6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/v6_packet.gif</image:loc><image:title>v6_packet</image:title></image:image><lastmod>2018-04-22T22:06:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/25/active-reconnaissance-and-port-scanning-using-nmap/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/nmap-eye-2.png</image:loc><image:title>Nmap eye 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/nmap.png</image:loc><image:title>nmap</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/xmas-tree-scan.png</image:loc><image:title>XMAS Tree scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ack-scan.png</image:loc><image:title>ACK Scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/fin-scan.png</image:loc><image:title>FIN scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/null-scan.png</image:loc><image:title>NULL Scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/syn-stealth-scan-2.png</image:loc><image:title>SYN Stealth Scan 2</image:title><image:caption>SYN Stealth scan. Reprinted from "The Preattack Phases," by the University of Maryland University College, 2012. </image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/syn-stealth-scan-1.png</image:loc><image:title>SYN Stealth Scan 1</image:title><image:caption>SYN Stealth scan. Reprinted from "The Preattack Phases," by the University of Maryland University College, 2012. </image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/tcp-connection-scan.png</image:loc><image:title>TCP Connection scan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/firewall-scan-sa.png</image:loc><image:title>firewall scan sA</image:title></image:image><lastmod>2018-04-20T23:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/20/how-organizations-can-determine-the-impact-of-cybersecurity-incidents/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/impact-featured-image.png</image:loc><image:title>impact featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/impact-featured-image.jpg</image:loc><image:title>impact featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/threat-feed-map.png</image:loc><image:title>threat feed map</image:title></image:image><lastmod>2018-04-20T22:50:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/19/nist-releases-version-1-1-of-the-cybersecurity-framework-heres-a-summary/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/csf-featured-image.png</image:loc><image:title>csf featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/csf-categories.png</image:loc><image:title>CSF Categories</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/csf-core-framework.png</image:loc><image:title>CSF Core Framework</image:title></image:image><lastmod>2018-04-19T20:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/19/scan-your-home-network-for-vulnerabilities-using-nessus/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-featured-image.png</image:loc><image:title>nessus featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-scan-details.png</image:loc><image:title>Nessus Scan details</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-scan-results.png</image:loc><image:title>Nessus Scan results</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-launch.png</image:loc><image:title>nessus launch</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-advanced1.png</image:loc><image:title>Nessus Advanced</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-advanced.png</image:loc><image:title>Nessus Advanced</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-new-scan-general.png</image:loc><image:title>Nessus New scan general</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-templates.png</image:loc><image:title>Nessus Templates</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nessus-home-web-console.png</image:loc><image:title>Nessus Home web console</image:title></image:image><lastmod>2018-04-19T01:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/18/a-simple-guide-to-vulnerability-management/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/vulnerability-management-featured-image.png</image:loc><image:title>vulnerability management featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/scan_results_vulners.png</image:loc><image:title>scan_results_vulners</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/spongebob.gif</image:loc><image:title>spongebob</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/nvd.png</image:loc><image:title>NVD</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/plug-ins.png</image:loc><image:title>plug-ins</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/server-based-agent-based.png</image:loc><image:title>server-based agent-based</image:title></image:image><lastmod>2018-04-18T00:48:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/16/7-ways-to-respond-to-network-threats/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/network-threat-featured-image.png</image:loc><image:title>network threat featured image</image:title></image:image><lastmod>2018-04-16T20:24:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/12/incident-response-the-computer-security-incident-handling-guide/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ir-featured-image.png</image:loc><image:title>IR featured image</image:title></image:image><lastmod>2018-04-12T18:17:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/15/making-dns-queries/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/dns-zones.png</image:loc><image:title>DNS ZONES</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/dns.png</image:loc><image:title>DNS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/microsoft-answer.png</image:loc><image:title>microsoft answer</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/micro1.png</image:loc><image:title>micro1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/gtld-sever.png</image:loc><image:title>gTLD sever</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/root-dns.png</image:loc><image:title>root dns</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/recursive-resolver.png</image:loc><image:title>Recursive Resolver</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/microsoft2.png</image:loc><image:title>microsoft</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/microsoft1.png</image:loc><image:title>microsoft</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/microsoft.png</image:loc><image:title>microsoft</image:title></image:image><lastmod>2018-04-12T02:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/11/what-is-penetration-testing/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/penetration-testing-featured-image.png</image:loc><image:title>penetration testing featured image</image:title></image:image><lastmod>2018-04-11T22:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/10/what-information-does-facebook-keep-about-you-see-for-yourself-youll-be-surprised/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-featured-image-1.png</image:loc><image:title>facebook featured image 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-videos.png</image:loc><image:title>Facebook videos</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-photos.png</image:loc><image:title>Facebook Photos</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-conversation.png</image:loc><image:title>Facebook conversation</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-messages.png</image:loc><image:title>Facebook Messages</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-html.png</image:loc><image:title>Facebook HTML</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-folder1.png</image:loc><image:title>Facebook folder</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-folder.png</image:loc><image:title>Facebook folder</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-download1.png</image:loc><image:title>Facebook download</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/facebook-download.png</image:loc><image:title>Facebook download</image:title></image:image><lastmod>2018-04-10T17:42:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/05/ipv6-link-local-addresses-global-unicast-addresses/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/ipv6-featured-image.png</image:loc><image:title>ipv6 featured image</image:title></image:image><lastmod>2018-04-05T22:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/04/04/pentest-edition-wireshark/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-featured-image.png</image:loc><image:title>Wireshark featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-colors1.png</image:loc><image:title>Wireshark colors</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-colors.png</image:loc><image:title>Wireshark colors</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-web-exchange.png</image:loc><image:title>Wireshark web exchange</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-operators-2.png</image:loc><image:title>wireshark operators 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-operators-1.png</image:loc><image:title>Wireshark operators 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-tcp-fiter.png</image:loc><image:title>wireshark tcp fiter</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-packet-details-popup-menu-2.png</image:loc><image:title>wireshark packet details popup menu 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-packet-details-popup-menu-1.png</image:loc><image:title>wireshark packet details popup menu 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/04/wireshark-popup-menu-2.png</image:loc><image:title>Wireshark popup menu 2</image:title></image:image><lastmod>2018-04-04T20:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/30/150-million-myfitnesspal-accounts-compromised-says-under-armour/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/myfitnespal.png</image:loc><image:title>myfitnespal</image:title></image:image><lastmod>2018-03-30T15:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/22/pentest-edition-kismet-wireless/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-network-specifics1.png</image:loc><image:title>Kismet Network specifics</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-featured-image.png</image:loc><image:title>Kismet featured image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wigle.png</image:loc><image:title>Wigle</image:title><image:caption>Map of wireless networks since 2017 in San Francisco </image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-panes.png</image:loc><image:title>Kismet panes</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/gps-dongle.jpg</image:loc><image:title>gps dongle</image:title><image:caption>GPS USB Dongle</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-view-client-2.png</image:loc><image:title>Kismet view client 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-view-client-1.png</image:loc><image:title>Kismet View client 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-network-specifics.png</image:loc><image:title>Kismet Network specifics</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-sort.png</image:loc><image:title>Kismet Sort</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/kismet-networks.png</image:loc><image:title>Kismet networks</image:title></image:image><lastmod>2018-03-28T17:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/24/10-network-diagnostic-command-line-utilities-every-network-tech-should-know/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/command-prompt.png</image:loc><image:title>command prompt</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/netsh.jpg</image:loc><image:title>netsh</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/linux-ss2.png</image:loc><image:title>linux-ss2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/netstat.gif</image:loc><image:title>netstat</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nbtstat.jpg</image:loc><image:title>nbtstat</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/dig_command.jpg</image:loc><image:title>dig_command</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nslookup-1.jpg</image:loc><image:title>nslookup 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/mtr.png</image:loc><image:title>mtr</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/pathping.png</image:loc><image:title>pathping</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/arp-a.png</image:loc><image:title>arp -a</image:title></image:image><lastmod>2018-03-24T15:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/22/secure-software-development-practices/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/programming.png</image:loc><image:title>programming</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fuzzing.png</image:loc><image:title>fuzzing</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/proxy1.png</image:loc><image:title>proxy</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/html-password.jpg</image:loc><image:title>HTML password</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/lapse.png</image:loc><image:title>Lapse+</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/sql-injection.jpg</image:loc><image:title>sql injection</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/server-error.png</image:loc><image:title>server error</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/devsecops.jpg</image:loc><image:title>devsecops</image:title></image:image><lastmod>2018-03-22T00:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/18/intrusion-detection-and-prevention-systems/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wids.png</image:loc><image:title>WIDS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/hids.png</image:loc><image:title>HIDS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nids-3.png</image:loc><image:title>NIDS 3</image:title><image:caption>Hybrid Sensors. Reprinted from "Intrusion Detection and Intrusion Prevention Systems," by UMUC, 2012.</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nids-2.png</image:loc><image:title>NIDS 2</image:title><image:caption>Inline Sensor. Reprinted from "Intrusion Detection and Intrusion Prevention Systems," by UMUC, 2012.</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nids-1.png</image:loc><image:title>NIDS 1</image:title><image:caption>Passive Sensor. Reprinted from "Intrusion Detection and Intrusion Prevention Systems," by UMUC, 2012.</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/intrusion-detection-and-prevention-system-1-638.jpg</image:loc><image:title>intrusion-detection-and-prevention-system-1-638</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/passive-sensor.png</image:loc><image:title>passive sensor</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/nips-sensor.png</image:loc><image:title>NIPS sensor</image:title></image:image><lastmod>2018-03-18T15:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/21/port-mirroring-on-switches/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-mirroing-feature.jpg</image:loc><image:title>port mirroing feature</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/spandroppedpackets.gif</image:loc><image:title>SPANDroppedPackets</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switch-span.gif</image:loc><image:title>Switch-SPAN</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switching-without-span.gif</image:loc><image:title>Switching-without-SPAN</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-mirroring-4.png</image:loc><image:title>port mirroring 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-mirroring-3.png</image:loc><image:title>port mirroring 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-mirroring-2.png</image:loc><image:title>port mirroring 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-mirroring-1.jpg</image:loc><image:title>port mirroring 1</image:title></image:image><lastmod>2018-03-16T23:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/16/common-endpoint-vulnerabilities-and-their-proper-remediation/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/endpoint-security.png</image:loc><image:title>endpoint security</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/malware.jpg</image:loc><image:title>malware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/proxy.png</image:loc><image:title>proxy</image:title></image:image><lastmod>2018-03-16T02:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/15/wi-fi-standards-the-ieee-802-11-wireless-lan-specifications/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifi1.jpg</image:loc><image:title>wifi</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wifi.jpg</image:loc><image:title>wifi</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/wi-fi.jpg</image:loc><image:title>wi-fi</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11-standards.png</image:loc><image:title>802.11 standards</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11ac-router-3.png</image:loc><image:title>802.11ac router 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11ac-router-2.jpg</image:loc><image:title>802.11ac router 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11ac-router-1.jpg</image:loc><image:title>802.11ac router 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/mu-mimo.png</image:loc><image:title>MU-MIMO</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11n-router-3.jpg</image:loc><image:title>802.11n router 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/802-11n-router-2.jpg</image:loc><image:title>802.11n router 2</image:title></image:image><lastmod>2018-03-15T00:33:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/09/identifying-network-related-symptoms-of-cyberattacks/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/cyber-attacks-ahead.png</image:loc><image:title>Cyber Attacks Ahead</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/ethical-hacker.jpg</image:loc><image:title>She's a genius programmer</image:title><image:caption>Cropped shot of a young computer programmer looking through data</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/sherlock-inspecting-computer.jpg</image:loc><image:title>sherlock holmes laptop computer silhouette</image:title><image:caption>sherlock holmes laptop computer silhouette in studio on white background</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/suspicious-hacker.jpg</image:loc><image:title>suspicious hacker</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/acrylic-wifi.png</image:loc><image:title>acrylic wifi</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/netstat-an.png</image:loc><image:title>netstat -an</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/netflow-analyzer.jpg</image:loc><image:title>NetFlow analyzer</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/liveaction-netflow.png</image:loc><image:title>LiveAction NetFlow</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/idsips-alert.png</image:loc><image:title>IDSIPS alert</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/mac-address-scan.png</image:loc><image:title>MAC address scan</image:title></image:image><lastmod>2018-03-09T21:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/05/dos-and-ddos-attacks-how-theyre-executed-detected-and-prevented/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/angry-computer-800x430.jpg</image:loc><image:title>angry-computer-800x430</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/dos-and-ddos.png</image:loc><image:title>DoS and DDoS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/syn_attack.gif</image:loc><image:title>syn_attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/dns-amplification-attack.gif</image:loc><image:title>DNS-Amplification-Attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/ping-of-death.jpg</image:loc><image:title>ping-of-death</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/land_attack.gif</image:loc><image:title>land_attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/fraggle-attack.gif</image:loc><image:title>fraggle attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/smurf-attack.gif</image:loc><image:title>Smurf attack</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/hole.jpg</image:loc><image:title>hole</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/udp-graph.png</image:loc><image:title>UDP graph</image:title><image:caption>Graph indicating spike in UDP traffic. Reprinted from "Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis," by SANS Institute, 2012. </image:caption></image:image><lastmod>2018-03-05T02:07:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/03/01/covert-channels-how-insiders-abuse-tcp-ip-to-create-covert-channels/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/covert-channels-1.png</image:loc><image:title>covert channels 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/ip-identification-field-covert.png</image:loc><image:title>IP Identification Field Covert</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/ipv4header.jpg</image:loc><image:title>ipv4header</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/ip-datagram.png</image:loc><image:title>ip datagram</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/tcp-ack-field-covert.png</image:loc><image:title>TCP ACK field covert</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/tcp-syn-field-covert.png</image:loc><image:title>TCP SYN field covert</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/03/tcp.png</image:loc><image:title>tcp</image:title></image:image><lastmod>2018-03-01T22:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/08/the-osi-model-quick-example/</loc><lastmod>2018-02-27T23:55:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/27/reports-claim-cellebrite-can-unlock-any-iphone-now-the-federal-gov-can-too/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/hacking-iphone-fbi.png</image:loc><image:title>hacking-iphone-fbi</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/unlock-iphone.png</image:loc><image:title>unlock iphone</image:title></image:image><lastmod>2018-02-27T17:37:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/29/ip-addresses-version-4/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ip-header.png</image:loc><image:title>ip.header</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ip-address-class2.png</image:loc><image:title>ip address class</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/anatomy-of-ipv4-address.jpg</image:loc><image:title>anatomy of ipv4 address</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/idk.png</image:loc><image:title>idk</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/private-ip-addresses.jpg</image:loc><image:title>private ip addresses</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/networki.png</image:loc><image:title>networki</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/bitwise-and1.png</image:loc><image:title>bitwise and</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/subnetmask1.png</image:loc><image:title>subnetmask</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/bitwise-and.png</image:loc><image:title>bitwise and</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/subnetmask.png</image:loc><image:title>subnetmask</image:title></image:image><lastmod>2018-02-27T02:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/22/how-hackers-decrypt-your-https-session-using-ssl-stripping/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/http-vs-https.png</image:loc><image:title>HTTP vs HTTPS</image:title></image:image><lastmod>2018-02-27T02:06:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/27/breaking-https-with-a-proxy/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/https-icon.png</image:loc><image:title>https icon</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/https-icon.jpg</image:loc><image:title>https icon</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ssl-proxy.png</image:loc><image:title>SSL Proxy</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/how-ssl-works.png</image:loc><image:title>How SSL works</image:title></image:image><lastmod>2018-02-27T01:58:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/20/tips-for-securing-your-network/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/mantrap.jpg</image:loc><image:title>mantrap</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/tips-for-securing-your-network.png</image:loc><image:title>Tips for securing your network</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/tpm2.jpg</image:loc><image:title>TPM2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/tpm1.jpg</image:loc><image:title>TPM1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/application-blacklist.png</image:loc><image:title>application blacklist</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/raid-2.jpg</image:loc><image:title>RAID 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/raid-1.jpg</image:loc><image:title>RAID 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/host-based-ids.jpg</image:loc><image:title>host-based IDS</image:title><image:caption>Image courtesy of Nikhil Raj at Slideshare.net</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/antimalware.png</image:loc><image:title>antimalware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/utm-device-2.jpg</image:loc><image:title>UTM device 2</image:title></image:image><lastmod>2018-02-26T00:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/16/a-single-text-character-from-the-telugu-language-can-crash-any-apple-device/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/apple-texrt-bug.jpg</image:loc><image:title>apple texrt bug</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/img_4969.jpg</image:loc><image:title>img_4969</image:title></image:image><lastmod>2018-02-16T18:44:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/02/16/the-ping-of-death/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ping-of-death-image.jpg</image:loc><image:title>ping of death image</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ping-of-death-gif.gif</image:loc><image:title>ping of death gif</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/icmp-packet.png</image:loc><image:title>icmp packet</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ip-datagram.png</image:loc><image:title>ip datagram</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/02/ping.jpg</image:loc><image:title>ping</image:title></image:image><lastmod>2018-02-16T03:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/31/routers-understanding-the-basics/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/routers-2.jpg</image:loc><image:title>routers 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/router-3.jpg</image:loc><image:title>router 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/router1.jpg</image:loc><image:title>router</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cisco-router-1.jpg</image:loc><image:title>Cisco router 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/ass.gif</image:loc><image:title>ASs</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cable-modem-4.jpeg</image:loc><image:title>cable modem 4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cable-modem-3.jpg</image:loc><image:title>cable modem 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cable-modem.jpeg</image:loc><image:title>cable modem</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/wireless-router-5.jpg</image:loc><image:title>wireless router 5</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/wireless-router-4.jpg</image:loc><image:title>wireless router 4</image:title></image:image><lastmod>2018-02-14T23:50:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/30/switch-security/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/security-switch.jpg</image:loc><image:title>security switch</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switching_loops.gif</image:loc><image:title>Switching_Loops</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/mac-address-filter.png</image:loc><image:title>MAC Address Filter</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/double-tagging.png</image:loc><image:title>Double-Tagging</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switch-spoofing.png</image:loc><image:title>Switch Spoofing</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/wiring-closet.jpg</image:loc><image:title>wiring closet</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switch-ports.jpg</image:loc><image:title>switch ports</image:title></image:image><lastmod>2018-02-14T23:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/16/hubs/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/hub4.png</image:loc><image:title>hub4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/hub1.png</image:loc><image:title>hub1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/wireshark-gid.gif</image:loc><image:title>wireshark gid</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/hubs.gif</image:loc><image:title>hubs</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/hub.gif</image:loc><image:title>hub</image:title></image:image><lastmod>2018-01-25T02:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/18/switches-are-the-way-to-go/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switches-cables.jpg</image:loc><image:title>switches cables</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cisco-switches.jpg</image:loc><image:title>cisco switches</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/cna.jpg</image:loc><image:title>cna</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/vlan.jpg</image:loc><image:title>vlan</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/h5yvl.gif</image:loc><image:title>h5yvl</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/mac-address-table.png</image:loc><image:title>MAC address table</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/mac-address-table1.jpg</image:loc><image:title>MAC address table1</image:title></image:image><lastmod>2018-01-25T02:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/22/methods-of-authentication-ppp-aaa-and-eap/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/802-1x.png</image:loc><image:title>802.1x</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/radius11.png</image:loc><image:title>RADIUS1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/radius1.png</image:loc><image:title>RADIUS1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/password-security-authentication.jpg</image:loc><image:title>password-security-authentication</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/radius.png</image:loc><image:title>radius</image:title></image:image><lastmod>2018-01-22T00:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/10/network-interface-cards-nics/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/nic-21.jpg</image:loc><image:title>NIC 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/link-lights.jpg</image:loc><image:title>link lights</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/pcie.jpg</image:loc><image:title>PCIe</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/insert-nic-1.jpg</image:loc><image:title>Insert NIC 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/insert-nic.jpg</image:loc><image:title>Insert NIC</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/pci.jpg</image:loc><image:title>PCI</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/nic-7.jpg</image:loc><image:title>NIC 7</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/nic61.jpg</image:loc><image:title>NIC6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/nic6.jpg</image:loc><image:title>NIC6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/ethernet_card.jpg</image:loc><image:title>ethernet_card</image:title></image:image><lastmod>2018-01-13T16:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/04/dns/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/whs-dns-server-693x693.jpg</image:loc><image:title>DNS Domain Name System Server</image:title><image:caption>DNS Domain Name System Server vector illustration technology</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/dns-example.png</image:loc><image:title>DNS example</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/dns-space.png</image:loc><image:title>dns space</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/nslookup.png</image:loc><image:title>nslookup</image:title></image:image><lastmod>2018-01-10T03:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2018/01/05/understanding-and-identifying-logical-ports/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/ports.jpg</image:loc><image:title>ports</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/port-numbers.png</image:loc><image:title>port numbers</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/patch-panel.jpg</image:loc><image:title>patch panel</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/router.jpg</image:loc><image:title>router</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2018/01/switch.jpg</image:loc><image:title>switch</image:title></image:image><lastmod>2019-08-28T08:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/25/control-types/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/access-control-natalia-merzlyakova.jpg</image:loc><image:title>Businessman pushing virtual security button</image:title><image:caption>Businessman pushing virtual security button</image:caption></image:image><lastmod>2018-01-09T23:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/19/1-4-billion-plaintext-credentials-found-on-the-dark-web-protect-yourself-with-a-strong-password/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/password-cracking-02222013.jpg</image:loc><image:title>password-cracking-02222013</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/passwordcount.png</image:loc><image:title>passwordcount</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/password-1-4-2png.png</image:loc><image:title>password 1.4.2png</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/password-1-4.png</image:loc><image:title>password 1.4</image:title></image:image><lastmod>2018-01-09T22:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/13/the-5-factors-of-authentication/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/eeb6361d3db3c7ea368ef533aa75af6a.jpg</image:loc><image:title>eeb6361d3db3c7ea368ef533aa75af6a</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/geolocation-map.jpg</image:loc><image:title>geolocation-map</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/androidlock2.png</image:loc><image:title>androidlock2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/biometrics.jpg</image:loc><image:title>Biometrics</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/tokens.jpg</image:loc><image:title>tokens</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/crescendo-series.jpg</image:loc><image:title>crescendo-series</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/pin.jpg</image:loc><image:title>pin</image:title></image:image><lastmod>2018-01-09T22:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/12/understanding-the-cia/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sk006.jpg</image:loc><image:title>sk006</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/uninterruptable-power-supply-2x1-fullres-1024x512.jpg</image:loc><image:title>uninterruptable-power-supply-2x1-fullres--1024x512</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/back-up-tapes-weekly.jpg</image:loc><image:title>Computer backup tapes for data recovery</image:title><image:caption>Computer backup tapes for data recovery</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/raid.jpg</image:loc><image:title>raid</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/servers.jpg</image:loc><image:title>servers</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/digital-signature.jpg</image:loc><image:title>digital-signature</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/hash.png</image:loc><image:title>hash</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/access-control.jpg</image:loc><image:title>access-control</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/key500.jpg</image:loc><image:title>Digital key in pixeled keyhole</image:title><image:caption>Digital key in pixeled keyhole, 3d render</image:caption></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/cia.jpg</image:loc><image:title>cia</image:title></image:image><lastmod>2018-01-09T22:56:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/07/the-approaching-arrival-of-cyberterrorism/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ids.jpg</image:loc><image:title>overall view of oil and gas industry, slight HDR effect</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/cissp.png</image:loc><image:title>cissp</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/defense.jpg</image:loc><image:title>defense</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/infrastructue.jpg</image:loc><image:title>infrastructue</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/1048480_130403100005_shill-bidding.jpg</image:loc><image:title>1048480_130403100005_shill-bidding</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sony.jpg</image:loc><image:title>sony</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/information-warfare.jpg</image:loc><image:title>information warfare</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/maxresdefault.jpg</image:loc><image:title>maxresdefault</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/anonymous-hacker-wide-angle-cyber-crime_eyaaia7d__f0000.png</image:loc><image:title>anonymous-hacker-wide-angle-cyber-crime_eyaaia7d__F0000</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sewage.jpg</image:loc><image:title>sewage</image:title></image:image><lastmod>2018-01-09T22:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/07/the-different-classes-of-malware/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/what-is-malware.jpg</image:loc><image:title>What-is-Malware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/botnet.jpg</image:loc><image:title>botnet</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/logic-bomb.jpg</image:loc><image:title>logic bomb</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/backdoor.jpg</image:loc><image:title>backdoor</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/rootkit-623x409.png</image:loc><image:title>rootkit-623x409</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/adware.jpg</image:loc><image:title>adware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/trojan-horse.jpg</image:loc><image:title>trojan horse</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/10083-worm-vir_article.jpg</image:loc><image:title>10083-worm-vir_article</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/army_of_two_01_1600x1200-550x.jpg</image:loc><image:title>army_of_two_01_1600x1200-550x</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/computervirus.jpg</image:loc><image:title>computervirus</image:title></image:image><lastmod>2018-01-09T22:54:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/15/spear-phishing-on-open-wi-fi-see-how-its-done-tutorial/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/cloudmark-ramps-up-fight-against-spear-phishing.jpg</image:loc><image:title>Cloudmark-Ramps-Up-Fight-Against-Spear-Phishing</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/text.png</image:loc><image:title>text</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/email.png</image:loc><image:title>Email</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/spear-phishing-e-mail.png</image:loc><image:title>Spear Phishing E-mail</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/wireshark-hibachi-credentials-close-up.png</image:loc><image:title>Wireshark Hibachi credentials close up</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/wireshark-hibachi-credentials.png</image:loc><image:title>Wireshark Hibachi Credentials</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/hibachi-wireshark.png</image:loc><image:title>hibachi wireshark</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/hibachi-credentials-close-up.png</image:loc><image:title>hibachi credentials close up</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/hibachi-credentials.png</image:loc><image:title>Hibachi Credentials</image:title></image:image><lastmod>2018-01-09T22:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/21/what-is-the-dark-web-how-to-access-it/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/dark-web-1-850x476.png</image:loc><image:title>dark-web-1-850x476</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/the-dark-web-3-638.jpg</image:loc><image:title>the-dark-web-3-638</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/tor.png</image:loc><image:title>TOR</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/deep-web-dark-web-differences.png</image:loc><image:title>Deep-Web-Dark-Web-differences</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/new-identity.png</image:loc><image:title>New Identity</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/ths-6.png</image:loc><image:title>THS-6</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/ths-5.png</image:loc><image:title>THS-5</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/ths-4.png</image:loc><image:title>THS-4</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/ths-3.png</image:loc><image:title>THS-3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/ths-2.png</image:loc><image:title>THS-2</image:title></image:image><lastmod>2018-01-09T22:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/15/android-malware-is-still-a-big-issue/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/hummingwhale-android-malware.jpg</image:loc><image:title>hummingwhale-android-malware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/gooligan-android-800x420.jpg</image:loc><image:title>Gooligan-Android-800x420</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/android-malware.jpeg</image:loc><image:title>android-malware</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/android-malware-840x473.jpg</image:loc><image:title>Android-malware-840x473</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/malware-androidv.jpg</image:loc><image:title>malware-androidv</image:title></image:image><lastmod>2018-01-09T22:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/04/educate-yourself-on-click-bait/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/article-new_ehow_images_a06_uc_0u_mouse-problems-xp-800x800.jpg</image:loc><image:title>article-new_ehow_images_a06_uc_0u_mouse-problems-xp-800x800</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/light-box.png</image:loc><image:title>light box</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/iphone.png</image:loc><image:title>iphone</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/iphone-3.png</image:loc><image:title>iphone 3</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/iphone-2.png</image:loc><image:title>iphone 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/iphone-1.png</image:loc><image:title>iphone 1</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/untitledfd.png</image:loc><image:title>Untitledfd</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/capcha.png</image:loc><image:title>capcha</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/facebook-scam.jpg</image:loc><image:title>facebook-scam</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/click-jack-like-1.png</image:loc><image:title>click jack like 1</image:title></image:image><lastmod>2018-01-01T00:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/21/single-sign-on-sso-authentication/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/sso.png</image:loc><image:title>sso</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ad-fs-2.png</image:loc><image:title>AD-FS 2</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/ad-fs.png</image:loc><image:title>AD-FS</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/transitive-trust1.png</image:loc><image:title>transitive trust</image:title></image:image><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/transitive-trust.png</image:loc><image:title>transitive trust</image:title></image:image><lastmod>2018-01-01T00:02:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/12/26/access-control-models/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/12/access-control-1.jpg</image:loc><image:title>Man entering security code to unlock the door</image:title><image:caption>Businessman entering safe code to unlock the door.</image:caption></image:image><lastmod>2017-12-31T23:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/2017/11/21/1162/</loc><image:image><image:loc>https://thecybersecurityman.com/wp-content/uploads/2017/11/phishing03_web.png</image:loc><image:title>phishing03_web</image:title></image:image><lastmod>2017-11-23T19:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersecurityman.com/posts/</loc><lastmod>2017-11-09T00:14:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersecurityman.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-05-04T16:26:58+00:00</lastmod></url></urlset>
