IPv6
IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Address An IPv6 address uses 128 bits. While IPV4 is represented by decimal numbers, IPv6 uses hexadecimal numbers. There are 8 blocks of 4…
IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Address An IPv6 address uses 128 bits. While IPV4 is represented by decimal numbers, IPv6 uses hexadecimal numbers. There are 8 blocks of 4…
This post summarizes some Virtual Private Network (VPN) services that are available for free. List of free VPN services List of free VPN services: Linux Fu VPN VPN Gate Tor HideMyAss hide.me Whoer.net Free Web Proxy SwitchVPN VyprVPN Linux Fu…
Self-signed certificates are widely used for testing purposes. In self-signed certificates, user creates a pair of public and private keys using a certificate creation tool and signs the document with the public key. The receiver requests the sender for the…
This post explains how can we identify the model of a wireless router using Linux. Step by step 1. Set your wireless adapter in monitor mode Check this post about how to put a wireless adapter in monitor mode in…
Wireless network interface controllers (WNIC’s) can operate in different modes: Managed mode: the only packets that are received in the computer are the one directed to it. Promiscuous mode: it is a listening mode that exists for both wired and…
First of all, you need to know your IP and the network range where it belongs to. It is important to perform scanning that you understand the meaning of IPv4 addresses. You can check this post explaining about it. Open…
This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Address An IPv4 address represents a single device on an IP network. An IPv4 address consist of 32 bits. Example: 11000110001100110110010000000000 These 32 bits…
This post explain what is Metasploit Framework and its uses regarding Certificated Ethical Hacker (CEH) Exam. It is not intented to be an overall review of the tool. It is focused on CEH v10. What is Metasploit Framework? Metasploit Framework…
There are some situtations in which you need to modify Windows firewall configuration and you have only command-line access. In these cases, you can make use of the command netsh Command Prompt. netsh is available from Windows 2000 and above.…
Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21” HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST” Contains cookies http.cookie Example: http.cookie External references…