Null Delhi chapter - Feb 2019

Tata Consultancy Services
5. May 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
1 von 32

Más contenido relacionado

Was ist angesagt?

NMAPNMAP
NMAPPrateekAryan1
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitableMohammed Akbar Shariff
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
N map presentationN map presentation
N map presentationulirraptor
NMapNMap
NMapPritesh Raka
NmapNmap
NmapNishaYadav177

Similar a Null Delhi chapter - Feb 2019

Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
The Art of Grey-Box AttackThe Art of Grey-Box Attack
The Art of Grey-Box AttackPrathan Phongthiproek
NMAP1.pptNMAP1.ppt
NMAP1.pptDakshKhurana15
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMPShaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
NmapNmap
NmapFat-Thing Gabriel-Culley

Último

Data Formats: Reading and writing JSON – XML - YAMLData Formats: Reading and writing JSON – XML - YAML
Data Formats: Reading and writing JSON – XML - YAMLCSUC - Consorci de Serveis Universitaris de Catalunya
2023 Ivanti September Patch Tuesday2023 Ivanti September Patch Tuesday
2023 Ivanti September Patch TuesdayIvanti
Webinar: Discover the Power of SpiraTeam - A Jira Alternative To Revolutioniz...Webinar: Discover the Power of SpiraTeam - A Jira Alternative To Revolutioniz...
Webinar: Discover the Power of SpiraTeam - A Jira Alternative To Revolutioniz...Inflectra
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...DianaGray10
class and object in c++.pptxclass and object in c++.pptx
class and object in c++.pptxAdarsh College, Hingoli
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratorenpanagenda

Último(20)

Null Delhi chapter - Feb 2019

Hinweis der Redaktion

  1. In a typical home network, all the devices are either connecter by WiFi or Lan to a central router/access point. And a unique IP is assigned to each device.
  2. While enterprise network is a bit complex, and can have many network devices sitting before your traffic leaves the company’s network. Inside the organization it uses Private IP addressing scheme and is converted into public IP at Gateway device (usually a firewall).
  3. Ask the audience to find their own public ip?
  4. Ask the audience to find their own public ip?
  5. The easiest way to check who else is on the network is to ping the ip(s) sequentially, if they respond it is up else it may down or simply isn’t responding
  6. When connected on the network, Users may browse the web, stream video, download/upload files with the help of different services. These services are can run on TCP (reliable) , UDP (unreliable) protocol or both on different port numbers.
  7. TCP – a stable connection must be established before data transfer is initiated via a process known as three-way handshake. UDP is connection less protocol communications are sent without any expectation of a timely confirmation of receipt from the remote end Thus, one has to allow for a longer timeout before it can be assumed that a remote port is closed
  8. On an network pentest engagement, you will receive a list of ip(s) or network subnet. You have to first identify the alive hosts and confirm the same with the client.
  9. On an network pentest engagement, you will receive a list of ip(s) or network subnet. You have to first identify the alive hosts and confirm the same with the client.