VPN dropped silently

You may come across the issue that the MAC users are able to connect to windows VPN server, but windows […]

IPBAN – Windows

In Linux we can use fail2ban to prevent brute attack based on the login failure attempt. Windows has a similar […]

Encryption and Tunneling Techniques

Authentication can be performed in several different ways, including the following: ■ Something you know—Passwords ■ Something you have—Tokens, smart cards, […]

User Agent Strings

User Agent Strings User agent strings act as another method to fingerprint a client. These characteristics range from identifying the browser […]

Nmap NSE scripts with examples

Information Gathering   1. DNS Brute Force Find sub-domains with this script. Detecting sub-domains associated with an organizations domain can reveal […]

Snort – Basic

Components of Snort A Snort-based IDS consists of the following major components: • Packet Decoder • Preprocessors • Detection Engine […]