Search for:
  • Home/
  • Month: December 2023

Understanding Indicators of Compromise and the Pyramid of Pain

Introduction In the realm of cybersecurity, understanding and efficiently responding to security threats is paramount. This blog post delves into the intricacies of Indicators of Compromise (IoCs) and the Pyramid of Pain, a conceptual framework crucial for enhancing organisational defences against cyber-attacks. Indicators of Compromise (IoCs) IoCs are pieces of [...]

Navigating Cybersecurity Incident Detection – Tools and Techniques

Exploring Beyond Detection Tools In the realm of cybersecurity, detection tools are indispensable for identifying threats, but there’s a broader spectrum of methods available to bolster these efforts. This blog delves into the various detection methodologies that organizations can leverage to fortify their defenses against cyber threats. The Detection and [...]

A Step-by-Step Guide to Tcpdump for Security Analysts

Introduction to TcpdumpTcpdump is a pivotal tool for those in security analysis, acting as a network protocol analyser. It operates via a command-line interface, allowing the capture and analysis of network traffic. It’s widely available on Linux distributions and Unix-based systems, including macOS®, enabling you to save and later examine [...]

Common Protocols and Wireshark Filters

Wireshark, is significance in network analysis the following is a common list of Protocols in and the filters to view them FTP (File Transfer Protocol) SSH (Secure Shell) Telnet SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol) TFTP (Trivial File Transfer Protocol) HTTP (Hypertext [...]

Packet Details and Wireshark

Investigating packet details using Wireshark is an essential capability for any security analyst. This comprehensive guide is designed to deepen your understanding of packet analysis, focusing on the examination of network packets and the identification of suspicious activities. Introduction to Internet Protocol (IP) IPv4 Header Fields IPv6 Header Fields Wireshark: [...]

Creating and testing crafted network packets

Step-by-Step Guide to Ethical Packet Crafting 1. Grasp the Essentials of Packet Crafting 2. Prepare Your Testing Environment 3. Install Required Software 4. Crafting and Dispatching Packets with Hping 5. Analysing Results with Snort 6. Advanced Packet Crafting Techniques 7. Concluding the Examination Essential Considerations Closing Thoughts Packet crafting is [...]

Understanding Packet Captures: A glimpse into Network Analysis

The Vital Role of Packet Analysis in Cybersecurity In the dynamic world of cybersecurity, the role of security analysts is integral to maintaining network integrity. One of their primary tasks involves the meticulous monitoring and analysis of network traffic flows. This is where the concept of packet captures becomes indispensable. [...]