Security – Page 5 – POFTUT

Category: Security

0

How To Exclude Hosts From Nmap Scan?

Nmap is very useful tool for network administration and security. It is most used tool in these areas. But a lot of people use it with very basic means. Here we will look more sophisticated usage of nmap step by step in this ant further posts. Target Hosts Create a text file and add hosts/networks to it and then use this file with nmap. You can use network blocks like...

0

How Configure Cisco For Logging?

Hi, collecting logs are important. In my daily job I am working with logs about a lot of systems like WMware , Application ,Linux,windows,Cisco ,checkpoint, pfSense. Logs provides info about the system, application etc. Security incident management systems heavily rely on logs. Example Log Logs consist of date system name and event detail like

Here Aug  1 05:39:30.992 is date info, %LINK-3-UPDOWN is subsystem info which says the log is...

0

How To Configure Cisco Routers and Switches Password

Hi, today we will look to configure Cisco routers and switches with password. It may be seen trivial but very important for security, because a lot of issues a password related. Network devices use a lot of protocols to work and this protocols needs security. Authentication resides in security and the first rule of authentication is real check.For example if you connect a switch with telnet you should give your...

0

Introduction To Squid

Hi today we will look most famous proxy in the world. Yes you guest it right it is squid. Proxy is an intermediate system that manages communication between two systems. In web applications http proxy is mostly used type. The client makes request to the proxy and then proxy makes the request to the server behalf of the client. So we may think that why we need intermediary system for...

0

How To Change Cisco IOS Time

Hi. Today we will look for changing system time and prompt.  You may think that what is the relation between system time and prompt, you are right there is no relation 🙂 . System time is important for network devices because logs get meaning with them and acl, vpn time limitations works truly with them. In order to change the system time we need enable mod not configure but I...

0

Introduction To Scapy Network Packet Generator

Scapy is a tool for network protocol, package generation and manipulation and showing them in a visual way with graphics and 3D images. There are tools equivalent like hping3 but scapy is very flexible against it. Scapy can manipulate all data of general protocols like IP, Ethernet, tcp, udp etc. If you have a network protocol scenerio you can implement it with scapy and python scripting. I advise to read...

Linux SCP Command Usage With Examples 1

Linux SCP Command Usage With Examples

What is Scp? Scp is an acronym for Secure Copy. It is used primarily for copying files over an ssh connection. The copied files are encrypted and assumed secure as ssh. If the files contain sensitive data copying them with SCP or similar encrypted protocol is the best solution. In this tutorial, we will look at how to use scp in a detailed manner. Install Scp is provided by ssh...

1

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

Ssh is a protocol designed to make network connections between hosts secure. Ssh is a defacto standard for Linux and related operating system. Ssh encrypts the connection between sides. Ssh gives terminal access between host and server. To get a terminal there need to be an authentication process. The authentication process is generally password-based but there are some caveats for password-based authentication. Brute force attacks can guess the password and...

Enjoy this blog? Please spread the word :)