Network Security Articles (17)

Kerberos Attack and Defense Techniques

Kerberos is a network authentication protocol based on client/server architecture. This protocol does not require users to provide their passwords; instead, it relies on tickets and keys for authentication. Kerberos is a commonly employed authentication protocol in Active Directory. Because of its popularity, it has drawn the attention of hackers worldwide attempting to exploit its security weaknesses and crack the protocol. This article goes over some of the most common Kerberos attacks, how to carry them out, and how to defend against them.

Securing Servers: An Introductory Guide

Servers need particular security implementations, because obtaining the information stored on the servers is the most profitable objective for an attacker. This blog post will help you secure your servers with simple and clear guidelines.

Intro to Hunting Webshells

A web shell is a script that can be uploaded to a web server to facilitate remote machine administration. Internal or Internet-facing web servers can be infected, and the web shell is used to pivot to internal hosts.

Suspicious Traffic Hunting

In this article, we will discuss how to identify normal network traffic when analyzing packets.

An Introduction to Active Directory and how PowerShell can be used as a Security Auditor

The network operating system (NOS) is a software-based networked environment that allows many workstations and computing devices to share resources. In 1990, Microsoft released Windows NT 3.0 that featured a NOS environment. Many aspects of the LAN Manager protocols and the OS/2 operating system were merged in this product. Over the next few years, the Windows NT NOS slowly evolved into Active Directory that was first formally deployed in Windows Server 2000.

Introduction to Web Application Firewall (WAF)

Web application firewalls are some of the most recent developments in the field of firewall technology (WAFs). In this blog post, we will define what a web application firewall is, how it functions. We will also cover some of the benefits of using a web application firewall.

Securing Wireless Network-based IDPS (NIDPS)

In this blog post we are going to make an introduction to how to secure wireless intrusion detection and prevention systems. Let’s start with a quick definition of IDPS as a refresher.

How to Stop SMTP Open Relays

SMTP stands for Simple Mail Transfer Protocol. This protocol allows email messages to be sent from one computer to another. The Internet was originally designed to allow computers to communicate directly with each other, without human intervention. In order to send emails, you need to know the address of the recipient (the person or company who receives the message).

Understanding Security Information and Event Management Systems (SIEMs)

Security Information and Event Management (SIEM) is a software system that combines Security Information Management (SIM); an automated process of collecting data of log files into a central archive, and Security Event Management; a type of computer security that monitors, correlates and notifies users of events as they occur in a system; to collect, analyze and report on all security-related events happening in an organization. The goal is to provide real-time monitoring of security devices such as firewalls, antivirus software, intrusion detection systems, and other network-based systems for potential threats. This post will explore the benefits of implementing a SIEM in your business by highlighting some of its most important features.

Understanding Proxy Servers

People frequently pause to consider how the internet works. Along with the benefits of using the internet, there are drawbacks and risks. But what happens when you browse the internet? You could be using a proxy server at work, on a Virtual Private Network (VPN), or you could be one of the more tech-savvy people who always uses some kind of proxy server.

Perimeter Security

Perimeter Security technologies offer a wide range of security services, from basic firewall protection to end-to-end network and business security. In essence, perimeter security is a defense system built around your network to prevent malicious attacks from entering.

DMZ security risks and opportunities

A DMZ network connects a company’s secure perimeter to unsecured external networks like the internet. Web servers and other externally facing systems can be located in the DMZ without jeopardizing the security of internal resources.

Secure Peer-to-Peer Networks

Peer-to-peer networks are vulnerable. There are several ways that malicious code can spread from user to user. For example, some P2P networks rely on file-sharing programs called BitTorrent. These programs automatically download new files from other users. If a virus infects the program, it can spread rapidly. How can you defend against malicious content as a P2P user?

Windows update types

If you’ve ever used a Windows device, you’ve probably encountered updates frequently — just before shutting down your computer. Your device may occasionally prompt you to install critical updates. There are also six yearly feature updates that are required! What exactly are these Windows Updates? What is the distinction between various types of Windows Updates? Let us now examine them. Before we get there, let’s distinguish between Windows Updates and Microsoft Updates.

Internet Protocol Security (IPSec)

TCP/IP has innate flaws. It was meant to run on a government network with a small number of hosts that trusted each other. Security was not a priority for the creators. However, now the network has been expanded worldwide, our most critical concern is security. Therefore, some extra measures were required to protect conversations via the Internet. In this blog, we will explain what Internet Protocol Security is and how it can offer protection over networks.

Transport Layer Security (TLS): An Introduction

Several approaches for creating a safe and authenticated channel between hosts have been presented. Finally, a better replacement to the SSL protocol was created which is TLS. In this blog we will make an introduction to Transport Layer Protection (TLS) protocol.

Secure Sockets Layer (SSL) and Secure-HTTP (HTTP-S) Protocols

In this blog post, we are going to explain what Secure Sockets Layer (SSL), and Secure-HTTP (HTTP-S) protocols are and how they differ from each other.