Pentest guru Navigation
  • About me
  • Free Course
  • Tools
  • Security Advisories
  • Projects
  • Publications
  • Books
  • About me
  • Free Course
  • Tools
  • Security Advisories
  • Projects
  • Publications
  • Books
Home Pentest guru header

Tag Archive

Below you'll find a list of all posts that have been tagged as “header”

Penetration testing course: 0x02.3.2 Network software – OSI and TCP/IP reference models

The first computer networks were designed with the hardware as the main concern and the software as an afterthought. This strategy no longer works. Network software is now highly structured. In the following sections we examine the software structuring technique in some detail. Protocol Hierarchies To reduce their design complexity, most networks are organized as a stack of layers or …

Read More

application layerdata link layerdatagramdialog controlheaderHTTPHyperText Transfer ProtocolICMPinterfaceInternet Control Message Protocolinternet layerInternet ProtocolIPlink layermedium access controlnetwork layernetwork softwarenetworkingOpen Systems InterconnectionOSIOSI modelpacketpeerphysical layerphysical mediumpresentation layerprotocolreference modelroutingservicesession layerstacksynchronizationTCPTCP/IPtoken managementTransmission Control Protocoltransport layerUDPUser Datagram Protocolvoice over IP

Newsletter

Recent Posts

  • Nebula level02 – exploit exercises walkthrough
  • Nebula level01 – exploit exercises walkthrough
  • Nebula level00 – exploit exercises walkthrough
  • WAS – Automatic USB drive malware scanning tool for the security-minded person
  • Penetration testing course: 0x02.4.1 What is the best programming language for hacking?

Recent Comments

  • Janith on Nebula level00 – exploit exercises walkthrough
  • Pawan kumar on Best books, tutorials and courses to learn about exploit development
  • Mustafiz on New book: Beginner’s Guide to Information Security: Kickstart your security career with insight from InfoSec experts
  • Fabio Baroni on ZoomEye : the CyberSpace search engine you never heard of
  • Fabio Baroni on Best books, tutorials and courses to learn about exploit development

Archives

  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • April 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015

Categories

  • bookmarks
  • books
  • conference
  • course
  • exploit development
  • exploit exercises
  • forensics
  • pentesting
  • prerequisites
  • tools
  • web app pentesting

Tags

Chinese command injection conference course CTF ethical hacking exploit exploit-exercises forensics hacking hacking tools hardware IDA Pro IDS Infosec Kali Linux malware analysis methodology nebula network networking network layer OWASP packet payload penetration tester penetration testing pentest.guru Pentesting prerequisites privilege escalation programming programming language Python reverse engineering script kiddie sectools security Shodan software Software Development Security tools web app web application wifi
  • Assign a Menu

POWERED BY THE X THEME

Toggle the Widgetbar