Network Topology is the physical and logical arrangement of the nodes and links in a Computer Network. Nodes are the compute devices that connect to the network and links are the medium that connect the nodes. The network topology depicts that structure of the network along with the nodes and links. Network Topology application of…
Author: kingsanit.pvt.ltd@gmail.com
Graph Theory
Graph Theory is a branch of Discrete Mathematics and is the study of graphs that are mathematical structures which depicts model of vertices (nodes) and edges (links) and the relationship between them. Graph theory is used in Computer Science for modeling structures of nodes and links with the relationship between them. The following is a…
Carrier Sense Multiple Access
CSMA (Carrier Sense Multiple Access) technology is used in LAN devices to prevent collision. Collision happens when devices connected in a network of collision domain transmits at the same time which will cause interruption of data flow between devices. Carrier Sense enables the network devices to listen for traffic and if the channel is free, transmission…
Switching
A switch in a Local Area Network (LAN) is a hardware device that connects multiple devices through a process known as Switching which happens at the Data Link Layer (Layer 2) of the OSI layer. Data Link layer is where a system starts placing data in the transmission medium (wired or wireless) by adding a…
Collision Domain
A LAN is network segment (wired or wireless) connecting multiple devices which becomes a network domain. If two devices are transmitting data at the same time in a network domain, they will collide and cause transmission failure due to the collusion of data. This network segment where all devices connecting to it and when transmitting…
Computer Network
A Computer Network is a connection of multiple devices which can be wired or wireless that provides communication between various devices that is connected to the network. The network can within an organization or home or across a geography. “Computer” denotes here any Compute System that has a CPU, ALU, Memory and Storage. Thus, a…
Local Area Network (LAN)
A Local Area Network (LAN) is a network that connects multiple devices and users within a single building or a small campus or a home. LAN provides connectivity between devices and users, so that they can communicate between each other. LAN compromises devices like routers, switches, desktops all connected to a network which can b…
Kerberos Attack
Kerberos is a strong authentication protocol that can be used in an open unprotected network. Despite it’s strength, there are some attacks that can be done against Kerberos which are as follows: Kerberoasting is post-exploitation attack technique. In this attack, the attacker has a compromised authenticated user’s account in a domain and targets Service Accounts…
Post Exploitation
In the Cyber Security, Post Exploitation refers to the phase after exploiting a target system. Cyber Kill Chain is the progressive steps in which an attacker performs an attack on a target system. An attacker starts with reconnaissance, then builds an exploit payload and delivers it to the target through email, file sharing etc. The…
Kerberos
Kerberos is a network authentication protocol developed by Massachusetts Institute of Technology that provides strong authentication between client and server using cryptography in an open unprotected network. Key Aspects of Kerberos Architecture Key Distribution Center (KDC) is the core component of Kerberos which acts as the 3rd Party Authentication providing Central Authentication to the domain (realm)…