InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
#interview #Cybersecurity
🔶Firewall identification

Normally, firewalls can be identified for offensive purposes. Firewalls are usually a first line of defense in the virtual perimeter; to breach the network from a hacker perspective, it is required to identify which firewall technology is used and how it’s configured. Some popular tactics are:

🔸Port scanning
Hackers use it for investigating the ports used by the victims.
Nmap is probably the most famous port-scanning tool available.

🔸Firewalking
The process of using traceroute-like IP packet analysis in order to verify if a data packet will be passed through the firewall from source to host of the attacker to the destination host of the victim.

🔸Banner grabbing
This is a technique to enable a hacker to spot the type of operation system or application running on a target server. It works through a firewall by using what looks like legitimate connections.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity

🔶Is IDS before or after firewall?

An intrusion detection system is placed behind a firewall but before the router. This location maximizes effectiveness, as the firewall can handle different types of threats to an IDS, and both will want to be in front of the router so that malicious data does not reach the users.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#interview #Cybersecurity

🔶What is Routing/ Packet Forwarding?

Routing is the process by which systems decide where to send a packet. Routing protocols on a system “discover” the other systems on the local network. When the source system and the destination system are on the same local network, the path that packets travel between them is called a direct route.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity

🔶 How exactly does a router forwards packets?


Well — because router simply accepts an incoming packet on an interface; then send this packet out to another interface. Since a router can have multiple interfaces; it needs to intelligently choose an exit interface that can leads the packet to its intended destination. In the figure above, Router7 gets an packet on the left interface; and it ‘forwards’ this packet out to the right interface.

🔶 Why not send this packet out to the middle interface?

Router made forwarding decision based on its routing table. The routing table contains entries of destination networks; and which exit interface to forward the packet to. This exit interface — is determined by many factors. First, it has to leads to the destination network. Second, it has to be the best path that leads to the destination network. All these information is stored in routers’ routing table.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
Routing Table
#interview #Cybersecurity
🔶The structure of a Routing Table
▫️Codes
The code section indicates the types of routing for each routes. The code is abbreviated into C, R, S etc. We simply refers to the code table at the start of the routing table to corresponding routing types.

‘C’ is the most common tag; which indicate the directly connected networks. ‘C’ automatically appears on the routing table whenever a new network is added to it directly. No configurations are needed for ‘C’ networks. In our example, we imply that there are 2 networks directly connected to the this router.

‘S’ indicates static routing; ‘S’ appears when we configure static route to a destination network. ‘S’ also appears when we configure a default route on the router (default route is a type of static route). Here we imply that there is a static route leading to 192.168.3.0 network.

‘R’ indicates RIP protocol; which is a type of dynamic routing. In fact, all codes corresponds to dynamic routing except for ‘C’ and ‘S’. ‘R’ appears on the table when we configure RIPv1 or RIPv2 on the source router and also the destination router. ‘R’ does not appear if only one side is configured with RIP. Here, we imply that there is one dynamic route that leads to 192.168.2.0 network.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity
🔶The structure of a Routing Table (part2)

▫️Destination Networks
As the name implies, the destination network component indicates the network address of the destination. It means the ‘network’ that we are trying to get to from this router. This is similar to the ‘destination’ we typed into Google maps for navigation.

Remember that every network has a network address, and packets are sent from one network to another based on this address (not host address). If the network address is not known but we have a host IP within that network; we need to calculate the network address by performing the ‘AND’ operation using the hostIP and the subnet mask of the network.

In our example, this router know its way to 4 different networks; namely, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24 and 200.1.1.0/24.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
#interview #Cybersecurity

🔶What is switch in routing?

A switch router is a device that combines the abilities of both switches and routers for routing data around and between networks. This device is able to forward data based on a device's physical address, as a switch, as well as forward packets based on the location of the next hop address as a router.

Layer 3 switches are thus able to segregate ports into separate VLANs and perform the routing between them. Like traditional router, a layer 3 switch can also be configured to support routing protocols such as RIP, OSPF, and EIGRP.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #cybersecurity #Switches

🔶Three Switch Functions at Layer 2
There are three distinct functions of layer 2 switching (you need to remember these!): address learning, forward/filter decisions, and loop avoidance.

🔸Address Learning Layer 2 switches and bridges remember the source hardware address of each frame received on an interface, and they enter this information into a MAC database called a forward/filter table.

🔸Forward/Filter Decisions When a frame is received on an interface, the switch looks at the destination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port.

🔸Loop Avoidance If multiple connections between switches are created for redundancy purposes, network loops can occur. Spanning

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #Cybersecurity
🔶What is fault tolerance?

Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating without interruption when one or more of its components fail.

e.g.) Hardware systems with identical or equivalent backup operating systems. For example, a server with an identical fault tolerant server mirroring all operations in backup, running in parallel, is fault tolerant.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
⚙️ آپدیت بزرگ، آرگو وی پی ان نسخه (v2.0):

🔰 با توجه به افزایش حداکثری فیلترینگ در ایران، طی هفته‌های گذشته نسخه جدید آرگو وی‌پی‌ان را به منظور دسترسی آزاد هموطنانمان به اینترنت توسعه دادیم.
تغییرات تکنیکال در این نسخه از برنامه بسیار زیاد است، از جمله ایجاد یک پروتکل جدید، بروزرسانی پروتکل ArgoAuthenticator و...، اما در اینجا تنها به مواردی خواهیم پرداخت که یک کاربر عادی میتواند از آن استفاده کند.

🔰 خلاصه امکاناتی که به اپلیکیشن اضافه شده است:

پشتیبانی از پراکسی شدوساکس.

یکی از مواردی که سیستم فیلترینگ ج.ا به منظور از کار انداختن فیلترشکن‌ها استفاده میکند، فیلترینگ بر اساس سایز MTU است. در این نسخه دوستان حرفه‌ای میتوانند سایز MTU تونل VPN آرگو را تغییر دهند و اینگونه بر این شیوه فیلترینگ چیره شوند.

فعال کردن و غیرفعال کردن محافظ اسکرین‌شات.

مهمترین ویژگی این آپدیت قابلیت جدیدی به نام کایلا (Kyla) است. این ویژگی شما کاربران عزیز را قادر میسازد تا کنترل کاملی بر روی ClientHello ارتباط TLS خود داشته باشید و از چنگ تکنیکی به نام TLS Fingerprint فرار کنید!

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
1👍1👎1
#interview #Cybersecurity
🔶What is an ARP packet?

ARP is the protocol used to associate the IP address to a MAC address. When a host wants to send a packet to another host, say IP address 10.5. 5.1, on its local area network (LAN), it first sends out (broadcasts) an ARP packet.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #Cybersecurity
🔶What is an ICMP packet?
ICMP packets are IP packets with ICMP in the IP data portion. ICMP messages also contain the entire IP header from the original message, so the end system knows which packet failed. The ICMP header appears after the IPv4 or IPv6 packet header and is identified as IP protocol number 1.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #Cybersecurity
🔶What Does PWN Mean?
PWN is hacker jargon meaning to conquer or dominate. In the context of online security, Pwned often means that your account or system has been breached, and your passwords—user passwords or privileged passwords—have been compromised. The word originated in online gaming forums as a misspelling of “owned.”

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube