Skip to content
Tuesday, May 13, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact
You are Here
  • Home
  • Blog
  • Attack Vector

Category: Attack Vector

Internal Network Attack Vector Discovery (Part III)
Attack Vector Data Data Security Firewalls LAN Network

Internal Network Attack Vector Discovery (Part III)

May 26, 2023May 26, 2023

I/ 802.1X Port-based Network Access Control (PNAC) enables authentication of devices that connect to a local network. The below image illustrates the transmission of Extensible

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part III)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part II)
Attack Vector Data Data Security LAN Network

Internal Network Attack Vector Discovery (Part II)

May 26, 2023May 26, 2023

802.1Q VLAN VLANS are used within enterprises to segment networks and create individual broadcast domains. Along with reducing unnecessary broadcast of traffic, 802.1Q tagging limits

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part II)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part I)
Attack Vector Data Data Security Firewalls LAN Network Penetration Test Pentesting

Internal Network Attack Vector Discovery (Part I)

May 19, 2023May 19, 2023

Most of the protocols using the data link layer and local broadcast addresses are nonroutable, which means you can only evaluate them from the local

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part I)
Share
Facebook Twitter Pinterest Linkedin

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.