Cyber Security

Wireshark Part 1

Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. It is…

TCP/IP Ports and Protocols

1 tcpmux TCP Port Service Multiplexer 2 compressnet Management Utility 3 compressnet Compression Process 5 rje Remote Job Entry 7 echo Echo 9 discard Discard 11 systat Active Users 13 daytime Daytime (RFC 867) 15 netstat netstat 15/tcp 17 qotd…

OSI Layers categorized

Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication…

Teardrop attack

Teardrop attack involves sending fragmented IP fragments with overlapping, over sized payloads to the target machine. This can crash various operating systems because of a bug in their TCP/IP fragmentation re-assembly code.Windows 3.1x, Windows 95 and Windows NT operating systems,…

Smurf attack

Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. The smurf program builds…

Fraggle attack

Fraggle Attack is a denial-of-service (DoS) attack, it is a variation of Smurf attack where an attacker sends a large amount of UDP traffic to ports 7 (echo) and 19 (chargen) to an IP Broadcast Address, with the intended victim's…

LAND attack

A LAND (Local Area Network Denial) attack is a DoS (Denial of Service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up. The security flaw was first discovered in 1997 by…

TCP sequence prediction attack

TCP sequence prediction attack is an attempt to predict the sequence number used to identify the packets in a TCP connection, which can be used to counterfeit packets. The attacker hopes to correctly guess the sequence number to be used…

Script language

A scripting or script language is a programming language that supports scripts, programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.Scripting languages are often interpreted (rather…

Compiled language

A compiled language is a programming language whose implementations are typically compilers , and not interpreters. In principle, any language can be implemented with a compiler or with an interpreter. A combination of both solutions is also common: a compiler…