Simple electrical work at a rest home, replacing outlets, fixing bell, new light switch, test & tag.
This packet tracer scenario includes setting up a hostname and an IP address, MOTD banner, MD5 hashed passwords, and telnet access to a Cisco catalyst 2960 switch from a remote computer. This is a lab from `www.packettracernetwork.com`.
The primary technology that firewalls use for filtering traffic is Access Control Lists. ACLs are typically maintained through a router and filter packets based on the requesting device's source or destination IP address.
Websockets provide a full-duplex communication channel over a single, long-lived connection between a client and a server on the web, enabling real-time data exchange. This article shows how to exploit websockets
HTTP smuggling is a web vulnerability that allows an attacker to interfere with the way a web server handles the stream of HTTP requests from users
CSRF is a vulnerability that allows an attacker to make requests from an external domain controlled by them. Then calls an endpoint for a vulnerable website that a victim has an account on, then uses the server to complete actions not intended by the victim.
This article will cover CORS and how to protect your website against CORS vulnerabilities. CORS involves modifying the Origin header, and many more complex methods.
Completing some exercises from the book "Brian Kernighan and Dennis Ritchie - The C Programming Language-Prentice". First exercise.
A list of cable types and network adapters
A list of network devices and hardware including diagrams and more info
Network Address Translation (NAT) is a networking technique used for modifying IP address information in packet headers while in transit across a routing device. The primary use of NAT is to allow multiple devices on a local network to access external networks, like the internet, using a single public IP address.
Gathering information from network devices is mandatory to ensure your devices are functioning correctly.
This article will cover switches at the Data Link layer, as well as VLANs for splitting up broadcast domains and segmenting networks in packet tracer.
This will cover basic WLAN standards and encryption methods.
Spanning Tree Protocol is a complex loop prevention algorithm that is used for fault tolerant distrusted switches. This article will cover STP in depth
These are all network scenarios I have created in packet tracer to help me understand how RIP, OSPF, EIGRP & BGP