#security Security 101 : DNS poisoning DNS poisoning changes the HOSTS file - maps hostnames to addresses - . It works by changing an IP addresses to point to a malicious site instead of the August 24, 2022 Share
#Linux, #security Linux 101 : Simple HoneyPot using Netcat Setting up a honeypot with netcat: Honeypots are computer environments used as a "bait" to detect unauthorized access attempts. Setting up a April 19, 2021 Share
#Linux, #security Security 101 : Nmap - Basic commands - The three-way handshake: The nmap tool: The nmap tool allows us, among other things, to do a UDP or TCP scan of the network ports on a network of hosts. April 14, 2021 Share
#security Security 101 : The TLS (Transport Layer Security) protocol TLS with openssl (ssh example): A certificate is used to ascertain the identity of the servers and also to encrypt the connection between a client and February 14, 2021 Share
#security Security 101 : Firewalls, iptables by example Iptables packet filtering has three elements to it: Tables : We are going to use the FILTER table since it is the most used. The filter table as its na January 04, 2021 Share
#Linux, #security SELinux 101 : SELinux roles and policies. In an SElinux-enabled system, every object (files, processes, sockets,...) has a security context or a label assigned to it. SElinux gives application December 02, 2020 Share