Skip to content
Wednesday, May 14, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact
You are Here
  • Home
  • Blog
  • Usernames

Tag: Usernames

Internal Network Attack Vector Discovery (Part III)
Attack Vector Data Data Security Firewalls LAN Network

Internal Network Attack Vector Discovery (Part III)

May 26, 2023May 26, 2023

I/ 802.1X Port-based Network Access Control (PNAC) enables authentication of devices that connect to a local network. The below image illustrates the transmission of Extensible

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part III)
Share
Facebook Twitter Pinterest Linkedin
Internal Network Attack Vector Discovery (Part I)
Attack Vector Data Data Security Firewalls LAN Network Penetration Test Pentesting

Internal Network Attack Vector Discovery (Part I)

May 19, 2023May 19, 2023

Most of the protocols using the data link layer and local broadcast addresses are nonroutable, which means you can only evaluate them from the local

Read More

Leave a Comment on Internal Network Attack Vector Discovery (Part I)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Final) – Assessment
Data Data Security Firewalls IDS IPS LAN Network Nmap TLS

TLS Security (Final) – Assessment

April 19, 2023April 19, 2023

In this blog, we will go over some of the methods and tools to assess the TLS security posture during an engagement. Please remember to

Read More

Leave a Comment on TLS Security (Final) – Assessment
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part II)
TLS

TLS Security (Part II)

April 6, 2023April 6, 2023

I. Understanding TLS Vulnerabilities Hackers can exploit some TLS flaws remotely, but practical exploitation of many requires network access to compromise ciphertext and data injection.

Read More

Leave a Comment on TLS Security (Part II)
Share
Facebook Twitter Pinterest Linkedin
TLS Security (Part I)
Data Data Security Network TLS

TLS Security (Part I)

March 3, 2023March 3, 2023

I. What is TLS? Before getting into TLS security, let’s first talk about encryption. It can generally be applied at different levels, from encryption in

Read More

Leave a Comment on TLS Security (Part I)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Final)
Data Data Security Firewalls LAN Network

SECURITY FEATURES on MacOSX (Final)

February 24, 2023February 24, 2023

We’ll go over the remaining security features on macOSX in this blog. 9. Firewall There is a built-in standalone firewall on MacOSX but it’s not

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Final)
Share
Facebook Twitter Pinterest Linkedin
LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Data Firewalls LAN Network

LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes

November 21, 2022November 21, 2022

Windows LM or NTLM & NTLMv2

Read More

Leave a Comment on LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Share
Facebook Twitter Pinterest Linkedin
Data Data Security OSINT Passisve Recon Pentesting

OSINT & Passive Recon

November 13, 2022November 13, 2022

In this blog, we’ll look at what OSINT – Open Source Intelligence is and tools we can use to gather information about the target. Reconnaissance

Read More

Leave a Comment on OSINT & Passive Recon
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

How to Secure WordPress Part III

September 29, 2022September 29, 2022

Let’s carry on where we left off last week (Part I and Part II). II. Secure Important Components 16. WordPress Security Keys & Salts WordPress

Read More

Leave a Comment on How to Secure WordPress Part III
Share
Facebook Twitter Pinterest Linkedin
Network Pentesting

How to Secure WordPress Part II

September 18, 2022September 18, 2022

Welcome to the next of the securing WordPress series. We’ll continue where we left off in part I. Secure WordPress Components (Contd) II. Secure Important

Read More

Leave a Comment on How to Secure WordPress Part II
Share
Facebook Twitter Pinterest Linkedin
1 2 Next »

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.