Recently Updated Pages
theHarvester
A passive reconnaissance tool. theHarvester is used to gather information from a variety of publ...
Shodan
A popular search engine for IoT devices. Users are able to search for specific types off devices...
OSINT
Open Source Intelligence A collection of resources and tools that are separated by common catego...
Physical Security
Lock the aliens out! Physical security is the first line of defense when it comes to physical ac...
ext4
Fourth Extended File Table: an advanced Linux file system. Features: everything from ext2 and ex...
Physical Security Policy
A document that defines restricted areas within company premises, identifies which employees are ...
Implementing Switch Security
Learn what to look out for when hardening a switch.
Address Resolution Protocol
A Layer 2 protocol that enables hosts to map IP addresses to MAC addresses in their local network...
On Path Attack
A type of web server attack where the attacker intercepts comms between two devices and modifies ...
Virtual LAN
A logical network segment configured on a managed network switch. VLAN membership is configured b...
Virtual Private Network
A type of network that uses encryption to forward IP traffic over a TCP/IP network. Tunneling pr...
Internet Protocol Security
A network protocol suite used to secure data through authentication and encryption as the data tr...
Proxy Servers
A server that mediates the communications between a client and another server. Proxies often have...
NAC Process
A terribly complicated four-step process that requires forethought when implementing network acce...
NAC Agents
How can devices connect to a network that has a robust access control configuration? NAC doesn't...
Identity Services Engine
A Cisco-owned NAC solution that uses policy-driven decision making to authenticate and authorize ...
Zero Trust Architecture
i can't trust any of you. all of you are fake. except you. i trust this one person. nobody else. ...
Simultaneous Authentication of Equals
A password-based authentication and password-authenticated key agreement method. SAE is a variant...
Windows Software Update Services
A patch management tool that allows client on a network to download software updates from an inte...
Access Control Methods
now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i'v...