Nmap: Network Mapper
In this post, we will use the nmap for host discovery, port-scanning, service detection and vulnerability assessment.
Nmap: Network Mapper Read More »
A computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital interconnections to communicate with each other. Wikipedia
In this post, we will use the nmap for host discovery, port-scanning, service detection and vulnerability assessment.
Nmap: Network Mapper Read More »
In this post, we will configure Active Directory on dz-dc(192.168.56.201) and create a domain ‘dangerzone.local’ with an AD user.
In this post, we will use some of the most common tools for network troubleshooting. These tools are shipped with the operating systems.
Common Network Tools Read More »
In this post, we will use Wireshark to capture the network traffic and observe the initial TCP/IP three-way handshake.
Wireshark: Network Protocol Analyzer Read More »
In this post, we will use Angry IP Scanner, a GUI tool, to scan the ‘dangerzone.local’ network for host discovery.
In this post, we will install and configure Windows Server 2022 Evaluation Edition and lay the foundation for the domain controller.
Dz-Dc #Domain-Controller #Dns-Server Read More »
In this post, we will install and configure the Physical Network and Systems. We will also prepare the host system for the virtual machines.
Physical Network And Systems Read More »
System components, processes, and bespoke and custom software should be tested frequently to ensure security controls continue to reflect.
Requirement 11: Test Security Regularly Read More »
To protect against compromise, PAN must be encrypted during transmission over networks, including untrusted and public networks.
Requirement 4: Protect Data During Transmission Read More »
Network Security Controls (NSCs), such as firewalls and other network security technologies, are network policy enforcement points.
Requirement 1: Install and Maintain Network Security Controls Read More »