Skip to content
Thursday, May 22, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact

Internal Network Attack Vector Discovery (Part III)
Attack Vector Data Data Security Firewalls LAN Network

Internal Network Attack Vector Discovery (Part III)

May 26, 2023May 26, 2023

I/ 802.1X Port-based Network Access Control (PNAC) enables authentication of devices that connect to a local network. The below image illustrates the transmission of Extensible

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part III)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part II)
Attack Vector Data Data Security LAN Network

Internal Network Attack Vector Discovery (Part II)

May 26, 2023May 26, 2023

802.1Q VLAN VLANS are used within enterprises to segment networks and create individual broadcast domains. Along with reducing unnecessary broadcast of traffic, 802.1Q tagging limits

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part II)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part I)
Attack Vector Data Data Security Firewalls LAN Network Penetration Test Pentesting

Internal Network Attack Vector Discovery (Part I)

May 19, 2023May 19, 2023

Most of the protocols using the data link layer and local broadcast addresses are nonroutable, which means you can only evaluate them from the local

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part I)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Final) – Assessment
Data Data Security Firewalls IDS IPS LAN Network Nmap TLS

TLS Security (Final) – Assessment

April 19, 2023April 19, 2023

In this blog, we will go over some of the methods and tools to assess the TLS security posture during an engagement. Please remember to

Read More

Leave a Comment on TLS Security (Final) – Assessment
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part II)
TLS

TLS Security (Part II)

April 6, 2023April 6, 2023

I. Understanding TLS Vulnerabilities Hackers can exploit some TLS flaws remotely, but practical exploitation of many requires network access to compromise ciphertext and data injection.

Read More

Leave a Comment on TLS Security (Part II)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part I)
Data Data Security Network TLS

TLS Security (Part I)

March 3, 2023March 3, 2023

I. What is TLS? Before getting into TLS security, let’s first talk about encryption. It can generally be applied at different levels, from encryption in

Read More

Leave a Comment on TLS Security (Part I)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Final)
Data Data Security Firewalls LAN Network

SECURITY FEATURES on MacOSX (Final)

February 24, 2023February 24, 2023

We’ll go over the remaining security features on macOSX in this blog. 9. Firewall There is a built-in standalone firewall on MacOSX but it’s not

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Final)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part II)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part II)

February 19, 2023February 19, 2023

In this blog, we’ll continue where we left off which covers the remaining security features on MacOS. 4. Automatic Updates New vulnerabilities for operating systems

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part II)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part I)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part I)

February 17, 2023February 17, 2023

In this blog, we will go over some of the security features on MacOS that implemented by Apple to protect their users. Apple is known

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part I)
Share
Facebook Twitter Pinterest Linkedin
SHODAN For PENETRATION TESTER
Penetration Test Pentesting Shodan Uncategorized

SHODAN For PENETRATION TESTER

February 2, 2023February 2, 2023

In this blog, we will talk about how we can use one of the most commonly used search engines during the penetration testing process –

Read More

Leave a Comment on SHODAN For PENETRATION TESTER
Share
Facebook Twitter Pinterest Linkedin
LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Data Firewalls LAN Network

LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes

November 21, 2022November 21, 2022

Windows LM or NTLM & NTLMv2

Read More

Leave a Comment on LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Share
Facebook Twitter Pinterest Linkedin
Data Data Security OSINT Passisve Recon Pentesting

OSINT & Passive Recon

November 13, 2022November 13, 2022

In this blog, we’ll look at what OSINT – Open Source Intelligence is and tools we can use to gather information about the target. Reconnaissance

Read More

Leave a Comment on OSINT & Passive Recon
Share
Facebook Twitter Pinterest Linkedin
Introduction to IDS and IPS
IDS IPS

Introduction to IDS and IPS

November 13, 2022November 13, 2022

An IDS or Intrusion Detection System monitors activity that is known or suspected to be malicious in its intent, raising alerts to a security or SOC teams to be analyzed.
IPS or Intrusion Prevention System adds another layer of defensive measure to protect resources.

Read More

Leave a Comment on Introduction to IDS and IPS
Share
Facebook Twitter Pinterest Linkedin
Firewalls Introduction
Data Security Firewalls Network

Firewalls Introduction

November 7, 2022November 7, 2022

Firewalls can handle simple attacks pretty quickly. However, they can easily be tricked because of the nature of network traffic in which almost all network traffic is bi-directional, but stateless firewalls must decide on….

Read More

Leave a Comment on Firewalls Introduction
Share
Facebook Twitter Pinterest Linkedin
Data Security Part I
Data Security

Data Security Part I

October 30, 2022October 30, 2022

In this blog, we’ll discuss the concept of VPN, in transit encryption and what benefits VPN bring to us. I. High Level Overview of VPN

Read More

Leave a Comment on Data Security Part I
Share
Facebook Twitter Pinterest Linkedin
Network Uncategorized

How to Secure WordPress Part IV

October 8, 2022October 8, 2022

Following the Part III, in this blog post, we’ll go over the security checklist that can be used as a reference to enhance the security

Read More

Leave a Comment on How to Secure WordPress Part IV
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

How to Secure WordPress Part III

September 29, 2022September 29, 2022

Let’s carry on where we left off last week (Part I and Part II). II. Secure Important Components 16. WordPress Security Keys & Salts WordPress

Read More

Leave a Comment on How to Secure WordPress Part III
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

How to Secure WordPress Part II

September 18, 2022September 18, 2022

Welcome to the next of the securing WordPress series. We’ll continue where we left off in part I. Secure WordPress Components (Contd) II. Secure Important

Read More

Leave a Comment on How to Secure WordPress Part II
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

How to Secure WordPress Part I

September 17, 2022September 18, 2022

I. Introduction When people talk about WordPress, often it would be something like: “it’s unsecured, it’s easy to get hacked,…”. But those are just misconceptions.

Read More

Leave a Comment on How to Secure WordPress Part I
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

Common Network Attack Vectors

August 25, 2022August 25, 2022

Today we are going to talk about a few common attack vectors, which are often taken when performing network penetration testing in enterprise and business

Read More

Leave a Comment on Common Network Attack Vectors
Share
Facebook Twitter Pinterest Linkedin
Nmap

Firewall Evasion with Nmap

July 10, 2022July 10, 2022

Nmap has a couple of options to bypass firewall rules and IDS/IPS such as decoys, packets fragmentation, scan delay and bad sum,…. How do they work?

Read More

Leave a Comment on Firewall Evasion with Nmap
Share
Facebook Twitter Pinterest Linkedin
Nmap

Nmap Basic

July 2, 2022July 10, 2022

I. What is Nmap? Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators

Read More

Leave a Comment on Nmap Basic
Share
Facebook Twitter Pinterest Linkedin
Network Windows

Group Policy Introduction (Part II)

April 14, 2025April 18, 2025

Understanding GPO Hierarchy and Workflow: Discover how Group Policy is processed in Windows environments. Learn the GPO hierarchy—Local, Site, Domain, and OU—and how each level

Read More

Leave a Comment on Group Policy Introduction (Part II)
Share
Facebook Twitter Pinterest Linkedin
Network Windows

Group Policy Introduction (Part I)

April 14, 2025April 14, 2025

A Core Tool for Secure IT ManagementDiscover the fundamentals of Group Policy in Windows—what it is, how it works, and why it’s essential for centralized

Read More

Leave a Comment on Group Policy Introduction (Part I)
Share
Facebook Twitter Pinterest Linkedin
Windows

🔒 Windows Fundamentals (Part III)

April 14, 2025

Understanding Session Objects, VAD Trees, and User-Mode Memory Allocation Slug: /windows-fundamentals-session-vad-usermode-memoryMeta Description:Explore Windows Fundamentals in-depth — learn how session objects, VAD trees, and user-mode memory

Read More

Leave a Comment on 🔒 Windows Fundamentals (Part III)
Share
Facebook Twitter Pinterest Linkedin
Windows

Windows Fundamentals (Part II)

April 12, 2025April 14, 2025

Windows memory management is a critical part of how the operating system maintains stability, performance, and security. In this second part of the Windows Fundamentals

Read More

Leave a Comment on Windows Fundamentals (Part II)
Share
Facebook Twitter Pinterest Linkedin
Uncategorized

🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

April 10, 2025

In this blog post, we’ll explore some of the most fundamental concepts behind how Windows manages memory at a low level. Learn how Windows handles

Read More

Leave a Comment on 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows
Share
Facebook Twitter Pinterest Linkedin
1 2 3 Next »

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.