Skip to content
Tuesday, May 13, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact
You are Here
  • Home
  • Blog
  • Private

Tag: Private

Internal Network Attack Vector Discovery (Part III)
Attack Vector Data Data Security Firewalls LAN Network

Internal Network Attack Vector Discovery (Part III)

May 26, 2023May 26, 2023

I/ 802.1X Port-based Network Access Control (PNAC) enables authentication of devices that connect to a local network. The below image illustrates the transmission of Extensible

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part III)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part I)
Attack Vector Data Data Security Firewalls LAN Network Penetration Test Pentesting

Internal Network Attack Vector Discovery (Part I)

May 19, 2023May 19, 2023

Most of the protocols using the data link layer and local broadcast addresses are nonroutable, which means you can only evaluate them from the local

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part I)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Final) – Assessment
Data Data Security Firewalls IDS IPS LAN Network Nmap TLS

TLS Security (Final) – Assessment

April 19, 2023April 19, 2023

In this blog, we will go over some of the methods and tools to assess the TLS security posture during an engagement. Please remember to

Read More

Leave a Comment on TLS Security (Final) – Assessment
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part II)
TLS

TLS Security (Part II)

April 6, 2023April 6, 2023

I. Understanding TLS Vulnerabilities Hackers can exploit some TLS flaws remotely, but practical exploitation of many requires network access to compromise ciphertext and data injection.

Read More

Leave a Comment on TLS Security (Part II)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part I)
Data Data Security Network TLS

TLS Security (Part I)

March 3, 2023March 3, 2023

I. What is TLS? Before getting into TLS security, let’s first talk about encryption. It can generally be applied at different levels, from encryption in

Read More

Leave a Comment on TLS Security (Part I)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Final)
Data Data Security Firewalls LAN Network

SECURITY FEATURES on MacOSX (Final)

February 24, 2023February 24, 2023

We’ll go over the remaining security features on macOSX in this blog. 9. Firewall There is a built-in standalone firewall on MacOSX but it’s not

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Final)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part II)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part II)

February 19, 2023February 19, 2023

In this blog, we’ll continue where we left off which covers the remaining security features on MacOS. 4. Automatic Updates New vulnerabilities for operating systems

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part II)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part I)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part I)

February 17, 2023February 17, 2023

In this blog, we will go over some of the security features on MacOS that implemented by Apple to protect their users. Apple is known

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part I)
Share
Facebook Twitter Pinterest Linkedin
Data Data Security OSINT Passisve Recon Pentesting

OSINT & Passive Recon

November 13, 2022November 13, 2022

In this blog, we’ll look at what OSINT – Open Source Intelligence is and tools we can use to gather information about the target. Reconnaissance

Read More

Leave a Comment on OSINT & Passive Recon
Share
Facebook Twitter Pinterest Linkedin
Introduction to IDS and IPS
IDS IPS

Introduction to IDS and IPS

November 13, 2022November 13, 2022

An IDS or Intrusion Detection System monitors activity that is known or suspected to be malicious in its intent, raising alerts to a security or SOC teams to be analyzed.
IPS or Intrusion Prevention System adds another layer of defensive measure to protect resources.

Read More

Leave a Comment on Introduction to IDS and IPS
Share
Facebook Twitter Pinterest Linkedin
1 2 Next »

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.