📚 Network

📚 General Network Terminology

Network Topology It’s a geometric arrangment of hosts and network devices. Can be physical (cables and PCs’ layout) or logical (informaiton transmission methods).

📚 Network Anonymity Techniques

Evasion techniques and what possible forensic footprints they are likely to leave? VPN Virtual private network.

📚 Network Infrastructure Glossary

Proxy Traditional Reverse Unlike a traditional proxy server, which is used to protect clients, a reverse proxy is used to protect servers….

Authentication Mechanisms

This article is all about different authentication/authorisation mechanisms such as Basic Auth, SSO, tokens etc.

Sending Events

This is about … .

Web Application basics

This is about … .

BTFM

dshell # MacOSX path to directory with pyenv (example): /Users/[user_name]/.pyenv/versions/3.8.5/envs/python3/lib/python3.8/site-packages/dshell/ decode -l # list decoders decode -d [decoder_name] # decoder info # who talked to whom decode -d ip [capture_file_name].

📚 Network Protocols

This set of articles describe network protocols for each layer separately. Each article may contain an attack description and how to metigate it.