Skip to main content

Posts

Showing posts from July, 2024

ARP & UDP header

  Acronyms AH Authentication Header (RFC 2402) ARP Address Resolution Protocol (RFC 826) BGP Border Gateway Protocol (RFC 1771) CWR Congestion Window Reduced (RFC 2481) DF Do not fragment flag (RFC 791) DHCP Dynamic Host Configuration Protocol (RFC 2131) DNS Domain Name System (RFC 1035) ECN Explicit Congestion Notification (RFC 3168) ESP Encapsulating Security Payload (RFC 2406) FTP File Transfer Protocol (RFC 959) GRE Generic Route Encapsulation (RFC 2784) HTTP Hypertext Transfer Protocol (RFC 1945) ICMP Internet Control Message Protocol (RFC 792) IGMP Internet Group Management Protocol (RFC 2236) IMAP Internet Message Access Protocol (RFC 2060) IP Internet Protocol (RFC 791) ISAKMP Internet Sec. Assoc. & Key Mngm Proto. (RFC 7296) L2TP Layer 2 Tunneling Protocol (RFC 2661) OSPF Open Shortest Path First (RFC 1583) POP3 Post Office Protocol v3 (RFC 1460) RFC Request for Comments SMTP Simple Mail Transfer Protocol (RFC 821) SSH Secure Shell (RFC 4253) SSL Secure Sockets Layer (...

Understanding data analysis

 Understanding data analysis The 21st century is the century of information. We are living in the age of information, which means that almost every aspect of our daily life is generating data. Not only this, but business operations, government operations, and social posts are also generating huge data. This data is accumulating day by day due to data being continually generated from business, government, scientific, engineering, health, social, climate, and environmental activities. In all these domains of decision-making, we need a systematic, generalized, effective, and flexible system for the analytical and scientific process so that we can gain insights into the data that is being generated. In today's smart world, data analysis offers an effective decision-making process for business and government operations. Data analysis is the activity of inspecting, preprocessing, exploring, describing, and visualizing the given dataset. The main objective of the data analysis process is ...

Burp Suite cheat sheet

 Burp Suite cheat sheet This cheat sheet enables users of Burp Suite with quicker operations and more ease of use. Burp Suite is the de-facto penetration testing tool for assessing web applications. It enables penetration testers to rapidly test applications via signature features like repeater, intruder, sequencer, and extender. Navigational Hotkeys Ctrl-Shift-T - Target Tab Ctrl-Shift-P - Proxy Tab Ctrl-Shift-R - Repeater Tab Ctrl-Shift-I - Intruder Tab Ctrl-Shift-O - Project Options Tab Ctrl-Shift-D - Dashboard Tab Ctrl-Equal - next tab Ctrl-Minus - previous tab Global Hotkeys Ctrl-I - Send to Intruder Ctrl-R - Send to Repeater Ctrl-S - Search (places cursor in search field) Ctrl-. - Go to next selection Ctrl-m - Go to previous selection Ctrl-A - Select all Ctrl-Z - Undo Ctrl-Y - Redo Editor Encoding / Decoding Hotkeys Ctrl-B - Base64 selection Ctrl-Shift-B - Base64 decode selection Ctrl-H - Replace with HTML Entities (key characters only) Ctrl-Shift-H - Replace HTML entities wi...

How a Routing Protocol Spans the OSI Model

  How a Routing Protocol Spans the OSI Model #osi #layers #physical #protocol #cisco #huawei

What is a Network?

A network is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources through cables, telephone lines, radio waves, satellites, or infrared light beams.  Types of Network LAN – Local Area Network A network contained within one building or over several buildings on a site is called a Local Area Network (LAN). MAN – Metropolitan Area Network A network that spans several sites across a city is called a Metropolitan Area Network (MAN). WAN – Wide Area Network A network that spans several cities, country or even the world is called a Wide Area Network (WAN).A Client/Server network may be a LAN, MAN or WAN, however a peer-to-peer network can only be a LAN. The most famous and widely used Wide Area Network is the Internet, which contains many thousands of servers and many millions of clients right across the world. Network Topologies: A Bus topology consists of a single cable—called a backbone— connecting...

Why do we need i-BGP for the routes when we have the IGP protocols (OSPF, IS-IS) for internal communication within the AS?

 Why do we need i-BGP for the routes when we have the IGP protocols (OSPF, IS-IS) for internal communication within the AS? IGPs like OSPF or ISIS, are link-state protocols that give us all the information of the network and allow for very interesting convergence options and traffic engineering options. Whereas, BGP knows a very limited view of the network as a whole because BGP handles very well filtering and modifying routing information. See, the traffic in a network can be divided into 4 categories. • Ingress: traffic arriving from outside the network, destined for hosts within the network. • Egress: traffic originating inside the network destined for hosts outside the network. • Internal: traffic where both the origin and destination are within the network. • Transit: traffic where both the origin and destination are outside the network. The IGP normally carries internal routes, so it can be used to directly route ingress and internal traffic, but what about egress and transit...