Skip to content
Wednesday, May 14, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact
You are Here
  • Home
  • Blog
  • Secure

Tag: Secure

Internal Network Attack Vector Discovery (Part III)
Attack Vector Data Data Security Firewalls LAN Network

Internal Network Attack Vector Discovery (Part III)

May 26, 2023May 26, 2023

I/ 802.1X Port-based Network Access Control (PNAC) enables authentication of devices that connect to a local network. The below image illustrates the transmission of Extensible

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part III)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part II)
Attack Vector Data Data Security LAN Network

Internal Network Attack Vector Discovery (Part II)

May 26, 2023May 26, 2023

802.1Q VLAN VLANS are used within enterprises to segment networks and create individual broadcast domains. Along with reducing unnecessary broadcast of traffic, 802.1Q tagging limits

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part II)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part I)
Attack Vector Data Data Security Firewalls LAN Network Penetration Test Pentesting

Internal Network Attack Vector Discovery (Part I)

May 19, 2023May 19, 2023

Most of the protocols using the data link layer and local broadcast addresses are nonroutable, which means you can only evaluate them from the local

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part I)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Final) – Assessment
Data Data Security Firewalls IDS IPS LAN Network Nmap TLS

TLS Security (Final) – Assessment

April 19, 2023April 19, 2023

In this blog, we will go over some of the methods and tools to assess the TLS security posture during an engagement. Please remember to

Read More

Leave a Comment on TLS Security (Final) – Assessment
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part II)
TLS

TLS Security (Part II)

April 6, 2023April 6, 2023

I. Understanding TLS Vulnerabilities Hackers can exploit some TLS flaws remotely, but practical exploitation of many requires network access to compromise ciphertext and data injection.

Read More

Leave a Comment on TLS Security (Part II)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part I)
Data Data Security Network TLS

TLS Security (Part I)

March 3, 2023March 3, 2023

I. What is TLS? Before getting into TLS security, let’s first talk about encryption. It can generally be applied at different levels, from encryption in

Read More

Leave a Comment on TLS Security (Part I)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Final)
Data Data Security Firewalls LAN Network

SECURITY FEATURES on MacOSX (Final)

February 24, 2023February 24, 2023

We’ll go over the remaining security features on macOSX in this blog. 9. Firewall There is a built-in standalone firewall on MacOSX but it’s not

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Final)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part II)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part II)

February 19, 2023February 19, 2023

In this blog, we’ll continue where we left off which covers the remaining security features on MacOS. 4. Automatic Updates New vulnerabilities for operating systems

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part II)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part I)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part I)

February 17, 2023February 17, 2023

In this blog, we will go over some of the security features on MacOS that implemented by Apple to protect their users. Apple is known

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part I)
Share
Facebook Twitter Pinterest Linkedin
LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Data Firewalls LAN Network

LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes

November 21, 2022November 21, 2022

Windows LM or NTLM & NTLMv2

Read More

Leave a Comment on LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Share
Facebook Twitter Pinterest Linkedin
1 2 Next »

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.