Social Engineering is the act of manipulating people and getting confidential information which is not accessible in normal circumstances. It is technique used as part of Active Footprinting where an attacker tries to gather information about a target initially before further moving in other phases of Cyber Kill Chain of an attack. Social Engineering relies…
Author: kingsanit.pvt.ltd@gmail.com
Phishing
Phishing is an act where an attacker impersonates as a legitimate person or entity and deceives a target to get sensitive information by sending emails, texts, SMS or having voice calls. The following are different techniques used in phishing attack.
Cycles Per Instruction (CPI)
Cycles Per Instruction (CPI) as known as Clock Cycle Per Instructions or Clocks Per Instruction is the number of clock cycles per cycle. It’s a critical metric with which a computer’s performance is measured and assessed. CPI Formula CPI = Total CPU Cycles / Total Instructions
Domain Name Service (DNS)
Domain Name Service (DNS) provides naming service for computers and services. It has a database of mappings of hostnames to IP addresses. Client which wants to access target services on a server, connects to the hostnames. To resolve the hostname, the client send requests to the DNS server and gets the IP address. Using the…
Computer Organization
Computer Organization is the collection of hardware units and their interconnection. It refers to how different operational components like processor, memory and peripheral devices are connected and their roles played when executing an instruction given to the computer.
Computer Architecture
Computer Architecture is the structure and behavior of a Computer that is visible to a programmer. A programmer uses the computer to execute a set of instructions for a specific objective. Computer Architecture is used interchangeably with Instruction Set. The Instruction Set is which that outlines the Computer Architecture.
Defense Advanced Research Projects Agency (DARPA)
Defense Advanced Research Projects Agency (DARPA) is a research and development agency in United States governed by Department of Defense (DOD) that is responsible for the development of emerging and breakthrough technologies for US military. ARPA was established in 1957. DARPA programs focus on the fundamental research required to establish proof of concept.
Network Information Center (NIC)
Network Information Center (NIC) also known as InterNIC was the organization that was responsible for Domain Name System (DNS) domain name allocations and X.500 directory services. From 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) took it the responsibility for managing DNS.
Dynamic Host Control Protocol (DHCP)
Dynamic Host Control Protocol (DHCP) is a network management protocol that is used in IP network to assign IP addressed to nodes connected to the network automatically. DHCP is described in RFC 2131. In 1980s, there was Diskless Workstations which did not have disk with basic memory that used network booting. Since it has very…
Bootstrap Protocol (BOOTP)
Bootstrap Protocol (BOOTP) is Networking Protocol that is used to assign dynamic IP address to workstations. BOOTP replaced RARP which has limitations of sending additional network configuration data apart from IP address and couldn’t operate across subnets as it’s OSI Layer 2 based protocol. BOOTP operates at L4 of OSI Layer and uses UDP to…