Introduction The world of networking and firewalls is constantly changing and evolving, with new tools and...
Network Articles
The mangle table
Introduction The mangle table is a unique and practical piece of furniture that has been around for centuries. It’s a...
The NAT table
Have you ever wondered how internet service providers (ISPs) manage to connect multiple devices to the internet using...
Configuring iptables
What is iptables? iptables is a powerful firewall tool for Linux, it is the firewall that is pre-installed in most...
Layer 4 – TCP and the three-way handshake
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol (IP) suite and operates...
Remote port enumeration using native tools
Introduction When it comes to security assessments and penetration testing, one of the most critical steps is...
Remote port and service enumeration – nmap
As the internet continues to grow, so does the number of devices and services that are connected to it. It's essential...
NMAP scripts
NMAP is a powerful network mapping and security auditing tool. It provides a way to scan and gather information about...
Wireless diagnostic operations
Wireless diagnostic operations refer to a process of identifying, troubleshooting, and resolving issues in wireless...
Layer 4 – how TCP and UDP ports work
When it comes to computer networking, there are various protocols and technologies that are used to establish...
MAC address OUI values
A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC) for use...
Network basics – the OSI model
The world of computer networks can be confusing, especially if you are new to the field. However, once you understand...