Friday, December 6, 2024
Home Tags Theory

Tag: Theory

TCP Flags Guide

0

LDAP Explained

0
- Advertisement -
Google search engine

RECENT

SIMILAR

Types of DoS Attacks

0
Denial of Service (DoS) attacks are malicious attempts to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. Volume-Based Attacks These attacks aim to consume the bandwidth of the target network or service. UDP Flood: This...

Cyber Threat Intelligence (CTI)

0
This is the process of gathering, analysing, and utilizing information about potential or current threats to an organization’s digital assets focusing on understanding the threat landscape identifying threat actors, and anticipating future attacks. It has several use cases as it can help in threat detection...

TCP Flags Guide

0
Here’s a breakdown of each TCP flag with its purpose and for what’s used. SYN (Synchronize) - Initiates a connection between two hosts. It’s the first step in the 3-way handshake, signalling the desire to establish communication. ACK (Acknowledgment) - Confirms the receipt of packages. After...