• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

Penetration Test Find the weak spots in your network

Last Updated on May 16, 2020 by Kalitut Leave a Comment

Those responsible for a local computer network are aware of the great effort involved in setting up and maintaining it. It is important to configure all components to be functional and up-to-date. For all user devices, the desired software must be installed and the appropriate access rights defined. The most important task, however, is to develop the appropriate security concept to protect your own network against harmful attacks. Depending on the network size and required security standard, very different measures and components are possible – from ordinary software firewalls and antivirus programs to more complex hardware firewalls to solutions with additional components such as intrusion detection and intrusion prevention systems.

What is a pentest?

But if the defense concept is in place, efforts do not have to be over: regular security testing to verify network protection is a common practice in larger companies and government agencies. With so-called penetration tests, in short, pentests,  For example, detect the attack potential of the network, individual participating systems or even a single application. On the basis of the test results, one can then initiate appropriate optimization measures. How is such a test done exactly and what does it mean for the existing network?

[Read more…] about Penetration Test Find the weak spots in your network

Filed Under: Penetration Testing

man in the middle attack

Last Updated on July 19, 2020 by Kalitut Leave a Comment

Man in the Middle Attack (MITM) is a long-standing network intrusion method, and there is still a wide range of development space today . Attacks such as SMB session hijacking and DNS spoofing are typical MITM attacks. In short, the so-called MITM attack is to intercept normal network communication data, and tamper with and sniff the data , but both parties of the communication are unaware.

man in the middle attack

With the continuous development of computer communication network technology, MITM attacks are becoming more and more diverse. Initially, as long as the attacker puts the network card into promiscuous mode and pretends to be a proxy server listening to specific traffic, the attack can be implemented, because many communication protocols are transmitted in plain text, such as HTTP, FTP, Telnet, etc. Later, as switches replaced hubs, simple sniffing attacks were no longer successful, and ARP spoofing was necessary. Today, more and more service providers (online banking, E-mail) began to use encrypted communication, SSL (Secure Sockets Layer) is a widely used technique, HTTPS, FTPS are all built on the basis of its

[Read more…] about man in the middle attack

Filed Under: Penetration Testing Tagged With: man in the middle attack

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023