Tag: MAC address
IPsec VPN Penetration Testing with BackTrack Tools
This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal...
Cyber Attacks Explained: Packet Spoofing
Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service...
Cyber Attacks Explained: DoS and DDoS
With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With...
Creating Your Own Server: The Socket API, Part 2
Earlier, we created a simple server and client program using the socket API. This time, we'll first start with a program, and then explain...
Advanced Nmap: NMap Script Scanning
In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...
Learning Nmap: The Basics
Nmap, the network mapping tool, is the starting point when analysing any network. It is an exciting tool -- compact and power-packed. This article...