📚 Network Protocols

📚 TCP/IP Stack Overview

This article is an overview of TCP/IP protocol stack. I will cover in detail what happens when a request to, say, bakerst221b.

📚 Wireless

Attacks iwconfig airmon-ng check kill airmon-ng start wlan0 iwconfig airodump-ng wlan0mon airdump-ng -c <channel number> --bssid <access point MAC> -w capture wlan0mon to capture the handshake or enough data to deduce the key.

IPSec

Routing Protocols

[1]

📚 Data Link Layer Protocols

This set of articles describe network protocols for each layer separately. Each article may contain an attack description and how to metigate it.

📚 Network Layer Protocols

This set of articles describe network protocols for each layer separately. Each article may contain an attack description and how to metigate it.

📚 Physical Layer Protocols

This set of articles describe network protocols for each layer separately. Each article may contain an attack description and how to metigate it.

📚 Transport Layer Protocols

This set of articles describe network protocols for each layer separately. Each article may contain an attack description and how to metigate it.

📚 Session, Presentation, Application Layer