Home Defensive Security

Defensive Security

hallowing

How to Perform Memory Forensics Enumeration of Objects?

We use Rekall, the complete Memory Analysis framework What do I need to understand first? First of all, there are a bunch of concepts that one has to grasp very well before...
tcpdump

TCP Dump

What is tcpdump? Tcpdump is considered a great security tool to depend on whenever connecting a computer or a device to a particular network that permits packets of type Transmission Control Protocol/Internet...
Snort

Snort

 What is Snort? One of the most important open source projects in the field of network security is Snort. It has proved itself as one of the best network security tools for...
Netcat

Netcat

Introduction to Netcat Reading from and writing to a network connection through protocols like Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) are always considered a great step for both a...
Firewall-infosec

What is meant by a firewall in network security?

Almost all small, medium and large organizations use the internet and have a connection to a company’s network. At the boundary of the organization network, there must be a partition of...
malware

How to Build a free Malware Analysis Toolkit?

It is very important to inspect the capabilities of a malicious software, also called malware. This is in order to understand its effect and hence take necessary steps to prevent it....
127.0.0.1

Why does public domain resolve to 127.0.0.1?

First, let's understand what 127.0.0.1 is. 127.0.0.1 is the loopback Internet protocol (IP) address otherwise called the “localhost”. The address establishes an IP connection to the same machine or computer that...
linux

Linux For InfoSec Professionals & Comptia Linux+ Exam Prep

There really aren't very many things that are more critical to your becoming a competent InfoSec professional than Linux. Just like a good plumber needs his tools so does the budding InfoSec...
Wireshark

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the terms of the GNU General Public License(GPL),...
powershell

PowerShell For InfoSec Professionals – June 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10, Server 2016) – you need Powershell! There is...