#interview #ai
🔸Unsupervised Learning
In unsupervised learning, we don't have labeled data. A model can identify patterns, anomalies, and relationships in the input data.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸Unsupervised Learning
In unsupervised learning, we don't have labeled data. A model can identify patterns, anomalies, and relationships in the input data.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Forwarded from InfoSecTube
📽 #Tutorials #android_penetration_testing
🌐 36 -How To Hack Android Phone on Same Wifi Network With Kali
🌐 37-How to Hack any android device using AhMyth over wan
🌐 38-how to hack android phone with spynote
🌐39-how to hack android phone with droidjack over the wan
🌐40-Hack Any Android Device With FatRat Tool(bind and fud rat)
🔝 @InfoSecTube
🌐 36 -How To Hack Android Phone on Same Wifi Network With Kali
🌐 37-How to Hack any android device using AhMyth over wan
🌐 38-how to hack android phone with spynote
🌐39-how to hack android phone with droidjack over the wan
🌐40-Hack Any Android Device With FatRat Tool(bind and fud rat)
🔝 @InfoSecTube
This media is not supported in your browser
VIEW IN TELEGRAM
این کلیپ توسط همکاران دکتر قره حسنلو ایجاد شده. حاوی عکس هایی از سوابق و اقدامات ایشون.
طبق خبرها دکتر قره حسنلو به اتهام فساد فی العرض به اعدام محکوم شده اند.
روزنامه شرق: دکتر قرهحسنلو در حال کمک به مجروحان بوده/ شاهد اصلی به دادگاه دعوت نشد
#منفی_امنیت
طبق خبرها دکتر قره حسنلو به اتهام فساد فی العرض به اعدام محکوم شده اند.
روزنامه شرق: دکتر قرهحسنلو در حال کمک به مجروحان بوده/ شاهد اصلی به دادگاه دعوت نشد
#منفی_امنیت
👎9❤7
🔸 تفاوت بین CVE و CWE
اصطلاح CVE مختصر عبارت common vulnerabilities and exposures میباشد،
در تعریفی کوتاه تفاوت میان CVE و CWE در این است که یکی در مورد علائم و دیگری در مورد علت است. همچنین CWE انواع آسیبپذیریهای نرمافزاری را نشان میدهد.
اصلاح CVE فقط فهرستی از ضعفهای شناخته شده در مورد سیستمها و محصولاتی خاص است. انجام این پروژه با اسپانسری US-CERT و نظارت Mitre صورت میگیرد. توسط CVE نگهداشت کنترلهای امنیتی برای اطمینان از برنامه کاربردی صورت میگیرد ولی به اندازه CWE یکپارچگی ندارد. با این حال، CVE براحتی با CWE سازگار است.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
اصطلاح CVE مختصر عبارت common vulnerabilities and exposures میباشد،
در تعریفی کوتاه تفاوت میان CVE و CWE در این است که یکی در مورد علائم و دیگری در مورد علت است. همچنین CWE انواع آسیبپذیریهای نرمافزاری را نشان میدهد.
اصلاح CVE فقط فهرستی از ضعفهای شناخته شده در مورد سیستمها و محصولاتی خاص است. انجام این پروژه با اسپانسری US-CERT و نظارت Mitre صورت میگیرد. توسط CVE نگهداشت کنترلهای امنیتی برای اطمینان از برنامه کاربردی صورت میگیرد ولی به اندازه CWE یکپارچگی ندارد. با این حال، CVE براحتی با CWE سازگار است.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
YouTube
InfoSecTube
Unlock the Power of Ethical Hacking: Learn by Hacking
🔒 Looking to master the art of ethical hacking? Welcome to a channel designed to quench your thirst for diving deep into pen-testing without the inevitable headache. With casually explained walk-throughs…
🔒 Looking to master the art of ethical hacking? Welcome to a channel designed to quench your thirst for diving deep into pen-testing without the inevitable headache. With casually explained walk-throughs…
👍1
#interview #ai
🔸Reinforcement Learning
The model can learn based on the rewards it received for its previous action.
Consider an environment where an agent is working. The agent is given a target to achieve. Every time the agent takes some action toward the target, it is given positive feedback. And, if the action taken is going away from the goal, the agent is given negative feedback.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸Reinforcement Learning
The model can learn based on the rewards it received for its previous action.
Consider an environment where an agent is working. The agent is given a target to achieve. Every time the agent takes some action toward the target, it is given positive feedback. And, if the action taken is going away from the goal, the agent is given negative feedback.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#معرفی_سایت
♻️ با استفاده از سایت های زیر میتونید بدون فیلترشکن یوتیوب تماشا کنید
💢بدون تبلیغات
💢قابلیت دانلود کلیپ ها
💢بدون نیاز به فیلترشکن
yewtu.be/ 🇳🇱
invidious.esmailelbob.xyz/ 🇨🇦
inv.bp.projectsegfau.lt/ 🇱🇺
invidious.nerdvpn.de/ 🇩🇪
invidious.sethforprivacy.com/ 🇩🇪
invidious.tiekoetter.com/ 🇩🇪
inv.vern.cc/ 🇺🇸
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
♻️ با استفاده از سایت های زیر میتونید بدون فیلترشکن یوتیوب تماشا کنید
💢بدون تبلیغات
💢قابلیت دانلود کلیپ ها
💢بدون نیاز به فیلترشکن
yewtu.be/ 🇳🇱
invidious.esmailelbob.xyz/ 🇨🇦
inv.bp.projectsegfau.lt/ 🇱🇺
invidious.nerdvpn.de/ 🇩🇪
invidious.sethforprivacy.com/ 🇩🇪
invidious.tiekoetter.com/ 🇩🇪
inv.vern.cc/ 🇺🇸
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
yewtu.be
Invidious - search
An alternative front-end to YouTube
👍2
Ashish_Mishra_Modern_Cybersecurity_Strategies_for_Enterprises_Protect.pdf
8.6 MB
📚 کتاب:
Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods
👤 نویسنده: Ashish Mishra
کتابی مهندسی و کاربردی برای کارشناسان، حاصل تجربیات 18 ساله یک مهندس در صنعت، حاوی مفاهیم امنیت، تهدیدها و ابزارها در یک سازمان، تیم پاسخ دهی به رخدادها
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods
👤 نویسنده: Ashish Mishra
کتابی مهندسی و کاربردی برای کارشناسان، حاصل تجربیات 18 ساله یک مهندس در صنعت، حاوی مفاهیم امنیت، تهدیدها و ابزارها در یک سازمان، تیم پاسخ دهی به رخدادها
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
دامنه com. را به ir. تغییر دهید
❗️شاپرک در نامهای به شرکتهای پرداختیار اعلام کرد با توجه به احتمال مسدود شدن دامنههای دات کام، پرداختیارها تا ۳ دی فرصت دارند سایت خود را به دامنه ir کنند.
میلاد جهاندار، مدیرعامل پرداختیار باهمتا و دبیر سابق انجمن فینتک در همین رابطه گفت: «رسیدن به مرحلهای که رگولاتوری حتی در انتخاب نام دامنه هم دخالت کند درجهای از رگولاتوری است که در هیچ کشوری اجرا نمیشود! ما به عنوان پرداختیار ترجیح می دهیم با این تصمیم همراه نشویم. چنین موضوعی صرفا روی پرداختیارها اثر ندارد و در نهایت همه کسبوکارهای فناوری را درگیر خواهد کرد.»
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
❗️شاپرک در نامهای به شرکتهای پرداختیار اعلام کرد با توجه به احتمال مسدود شدن دامنههای دات کام، پرداختیارها تا ۳ دی فرصت دارند سایت خود را به دامنه ir کنند.
میلاد جهاندار، مدیرعامل پرداختیار باهمتا و دبیر سابق انجمن فینتک در همین رابطه گفت: «رسیدن به مرحلهای که رگولاتوری حتی در انتخاب نام دامنه هم دخالت کند درجهای از رگولاتوری است که در هیچ کشوری اجرا نمیشود! ما به عنوان پرداختیار ترجیح می دهیم با این تصمیم همراه نشویم. چنین موضوعی صرفا روی پرداختیارها اثر ندارد و در نهایت همه کسبوکارهای فناوری را درگیر خواهد کرد.»
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👎8🏆1
api-security-in-action-1nbsped-9781617296024.pdf
10.4 MB
📚 کتاب:
API Security in Action teaches you how to create secure APIs for any situation.
👤 نویسنده: Neil Madden
کتاب Api Security In Action به شما می آموزد که چگونه API های امن برای هر موقعیتی ایجاد کنید.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
API Security in Action teaches you how to create secure APIs for any situation.
👤 نویسنده: Neil Madden
کتاب Api Security In Action به شما می آموزد که چگونه API های امن برای هر موقعیتی ایجاد کنید.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
چتبات مبتنی بر هوش مصنوعی ChatGPT چیست؟
یک نمونه اولیه از چتبات دیالوگ محور مبتنی بر هوش مصنوعی است که میتواند زبان طبیعی انسان را متوجه شود و متون نوشتاری بسیار دقیقی مشابه انسان تولید کند. درحقیقت ChatGPT جدیدترین نسخه از GPT، خانوادهای از هوش مصنوعی با قابلیت تولید متن بهحساب میآید.
چگونه کار میکند؟
این چتبات که با هوش مصنوعی و یادگیری ماشینی توسعه پیدا کرده است، از طریق یک رابط کاربری گفتگومحور، به سؤالات پاسخ داده و اطلاعات در اختیار کاربران قرار میدهد. این ابزار از طریق یک نمونه عظیم از اطلاعات اینترنت آموزش داده شده است.
به گفته OpenAI، این ابزار با تمرکز روی سادگی در استفاده توسعه پیدا کرده است: «قالب گفتگومحور، این قابلیت را به ChatGPT داده تا بتواند به سؤالات بعدی کاربران هم جواب دهد، اشتباهات خود را بپذیرد و به چالش بکشد و همچنین درخواستهای نامناسب را رد کند.»
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
یک نمونه اولیه از چتبات دیالوگ محور مبتنی بر هوش مصنوعی است که میتواند زبان طبیعی انسان را متوجه شود و متون نوشتاری بسیار دقیقی مشابه انسان تولید کند. درحقیقت ChatGPT جدیدترین نسخه از GPT، خانوادهای از هوش مصنوعی با قابلیت تولید متن بهحساب میآید.
چگونه کار میکند؟
این چتبات که با هوش مصنوعی و یادگیری ماشینی توسعه پیدا کرده است، از طریق یک رابط کاربری گفتگومحور، به سؤالات پاسخ داده و اطلاعات در اختیار کاربران قرار میدهد. این ابزار از طریق یک نمونه عظیم از اطلاعات اینترنت آموزش داده شده است.
به گفته OpenAI، این ابزار با تمرکز روی سادگی در استفاده توسعه پیدا کرده است: «قالب گفتگومحور، این قابلیت را به ChatGPT داده تا بتواند به سؤالات بعدی کاربران هم جواب دهد، اشتباهات خود را بپذیرد و به چالش بکشد و همچنین درخواستهای نامناسب را رد کند.»
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍4
#Interview #cybersecurity
🔶What are the types of firewalls?
Based on their method of operation, there are four different types of firewalls:
🔸Packet Filtering Firewalls: Packet filtering firewalls are the oldest, most basic type of firewalls.
🔸Circuit-Level Gateways.
🔸Stateful Inspection Firewalls.
🔸Application-Level Gateways (Proxy Firewalls)
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶What are the types of firewalls?
Based on their method of operation, there are four different types of firewalls:
🔸Packet Filtering Firewalls: Packet filtering firewalls are the oldest, most basic type of firewalls.
🔸Circuit-Level Gateways.
🔸Stateful Inspection Firewalls.
🔸Application-Level Gateways (Proxy Firewalls)
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3
#interview #Cybersecurity
🔶Stateful vs. Stateless Firewalls: What's the Difference?
Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶Stateful vs. Stateless Firewalls: What's the Difference?
Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity
🔶Difference between Firewall and Intrusion Detection System
A firewall is a hardware and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a software that stands between a local network and the Internet, and filters traffic that might be harmful.
An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network.
We can think a firewall as security personnel at the gate and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator.
A firewall is a hardware and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a sotware that stands between a local network and the Internet, and filters traffic that might be harmful.
An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network.
We can think a firewall as security personnel at the gate and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶Difference between Firewall and Intrusion Detection System
A firewall is a hardware and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a software that stands between a local network and the Internet, and filters traffic that might be harmful.
An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network.
We can think a firewall as security personnel at the gate and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator.
A firewall is a hardware and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a sotware that stands between a local network and the Internet, and filters traffic that might be harmful.
An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network.
We can think a firewall as security personnel at the gate and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#interview #Cybersecurity
🔶Firewall identification
Normally, firewalls can be identified for offensive purposes. Firewalls are usually a first line of defense in the virtual perimeter; to breach the network from a hacker perspective, it is required to identify which firewall technology is used and how it’s configured. Some popular tactics are:
🔸Port scanning
Hackers use it for investigating the ports used by the victims.
Nmap is probably the most famous port-scanning tool available.
🔸Firewalking
The process of using traceroute-like IP packet analysis in order to verify if a data packet will be passed through the firewall from source to host of the attacker to the destination host of the victim.
🔸Banner grabbing
This is a technique to enable a hacker to spot the type of operation system or application running on a target server. It works through a firewall by using what looks like legitimate connections.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶Firewall identification
Normally, firewalls can be identified for offensive purposes. Firewalls are usually a first line of defense in the virtual perimeter; to breach the network from a hacker perspective, it is required to identify which firewall technology is used and how it’s configured. Some popular tactics are:
🔸Port scanning
Hackers use it for investigating the ports used by the victims.
Nmap is probably the most famous port-scanning tool available.
🔸Firewalking
The process of using traceroute-like IP packet analysis in order to verify if a data packet will be passed through the firewall from source to host of the attacker to the destination host of the victim.
🔸Banner grabbing
This is a technique to enable a hacker to spot the type of operation system or application running on a target server. It works through a firewall by using what looks like legitimate connections.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔶Is IDS before or after firewall?
An intrusion detection system is placed behind a firewall but before the router. This location maximizes effectiveness, as the firewall can handle different types of threats to an IDS, and both will want to be in front of the router so that malicious data does not reach the users.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶Is IDS before or after firewall?
An intrusion detection system is placed behind a firewall but before the router. This location maximizes effectiveness, as the firewall can handle different types of threats to an IDS, and both will want to be in front of the router so that malicious data does not reach the users.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
🔶Latest Nuclei Release v2.8.3!
https://github.com/projectdiscovery/nuclei/releases/tag/v2.8.3
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
https://github.com/projectdiscovery/nuclei/releases/tag/v2.8.3
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
GitHub
Release v2.8.3 · projectdiscovery/nuclei
What's Changed
Fixed bug to consider clustering with automatic http probing by @Ice3man543 in #3019
Fixed bug to remove blank protocol name by @vzamanillo in #2993
Added option to disable requ...
Fixed bug to consider clustering with automatic http probing by @Ice3man543 in #3019
Fixed bug to remove blank protocol name by @vzamanillo in #2993
Added option to disable requ...
👍1
#interview #Cybersecurity
🔶What is Routing/ Packet Forwarding?
Routing is the process by which systems decide where to send a packet. Routing protocols on a system “discover” the other systems on the local network. When the source system and the destination system are on the same local network, the path that packets travel between them is called a direct route.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶What is Routing/ Packet Forwarding?
Routing is the process by which systems decide where to send a packet. Routing protocols on a system “discover” the other systems on the local network. When the source system and the destination system are on the same local network, the path that packets travel between them is called a direct route.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity
🔶 How exactly does a router forwards packets?
Well — because router simply accepts an incoming packet on an interface; then send this packet out to another interface. Since a router can have multiple interfaces; it needs to intelligently choose an exit interface that can leads the packet to its intended destination. In the figure above, Router7 gets an packet on the left interface; and it ‘forwards’ this packet out to the right interface.
🔶 Why not send this packet out to the middle interface?
Router made forwarding decision based on its routing table. The routing table contains entries of destination networks; and which exit interface to forward the packet to. This exit interface — is determined by many factors. First, it has to leads to the destination network. Second, it has to be the best path that leads to the destination network. All these information is stored in routers’ routing table.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶 How exactly does a router forwards packets?
Well — because router simply accepts an incoming packet on an interface; then send this packet out to another interface. Since a router can have multiple interfaces; it needs to intelligently choose an exit interface that can leads the packet to its intended destination. In the figure above, Router7 gets an packet on the left interface; and it ‘forwards’ this packet out to the right interface.
🔶 Why not send this packet out to the middle interface?
Router made forwarding decision based on its routing table. The routing table contains entries of destination networks; and which exit interface to forward the packet to. This exit interface — is determined by many factors. First, it has to leads to the destination network. Second, it has to be the best path that leads to the destination network. All these information is stored in routers’ routing table.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#interview #Cybersecurity
🔶The structure of a Routing Table
▫️Codes
The code section indicates the types of routing for each routes. The code is abbreviated into C, R, S etc. We simply refers to the code table at the start of the routing table to corresponding routing types.
‘C’ is the most common tag; which indicate the directly connected networks. ‘C’ automatically appears on the routing table whenever a new network is added to it directly. No configurations are needed for ‘C’ networks. In our example, we imply that there are 2 networks directly connected to the this router.
‘S’ indicates static routing; ‘S’ appears when we configure static route to a destination network. ‘S’ also appears when we configure a default route on the router (default route is a type of static route). Here we imply that there is a static route leading to 192.168.3.0 network.
‘R’ indicates RIP protocol; which is a type of dynamic routing. In fact, all codes corresponds to dynamic routing except for ‘C’ and ‘S’. ‘R’ appears on the table when we configure RIPv1 or RIPv2 on the source router and also the destination router. ‘R’ does not appear if only one side is configured with RIP. Here, we imply that there is one dynamic route that leads to 192.168.2.0 network.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶The structure of a Routing Table
▫️Codes
The code section indicates the types of routing for each routes. The code is abbreviated into C, R, S etc. We simply refers to the code table at the start of the routing table to corresponding routing types.
‘C’ is the most common tag; which indicate the directly connected networks. ‘C’ automatically appears on the routing table whenever a new network is added to it directly. No configurations are needed for ‘C’ networks. In our example, we imply that there are 2 networks directly connected to the this router.
‘S’ indicates static routing; ‘S’ appears when we configure static route to a destination network. ‘S’ also appears when we configure a default route on the router (default route is a type of static route). Here we imply that there is a static route leading to 192.168.3.0 network.
‘R’ indicates RIP protocol; which is a type of dynamic routing. In fact, all codes corresponds to dynamic routing except for ‘C’ and ‘S’. ‘R’ appears on the table when we configure RIPv1 or RIPv2 on the source router and also the destination router. ‘R’ does not appear if only one side is configured with RIP. Here, we imply that there is one dynamic route that leads to 192.168.2.0 network.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity
🔶The structure of a Routing Table (part2)
▫️Destination Networks
As the name implies, the destination network component indicates the network address of the destination. It means the ‘network’ that we are trying to get to from this router. This is similar to the ‘destination’ we typed into Google maps for navigation.
Remember that every network has a network address, and packets are sent from one network to another based on this address (not host address). If the network address is not known but we have a host IP within that network; we need to calculate the network address by performing the ‘AND’ operation using the hostIP and the subnet mask of the network.
In our example, this router know its way to 4 different networks; namely, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24 and 200.1.1.0/24.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶The structure of a Routing Table (part2)
▫️Destination Networks
As the name implies, the destination network component indicates the network address of the destination. It means the ‘network’ that we are trying to get to from this router. This is similar to the ‘destination’ we typed into Google maps for navigation.
Remember that every network has a network address, and packets are sent from one network to another based on this address (not host address). If the network address is not known but we have a host IP within that network; we need to calculate the network address by performing the ‘AND’ operation using the hostIP and the subnet mask of the network.
In our example, this router know its way to 4 different networks; namely, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24 and 200.1.1.0/24.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2