Network Security - Network Segmentation and Micro-Segmentation

Explore the power of network segmentation and micro-segmentation in enhancing network security. Learn about the benefits, implementation strategies, and how they align with the Zero Trust model. 🛡️

May 17, 2024 · 10 min · UncleSp1d3r

Network Protocol Analysis - Wireshark and tcpdump

Explore network protocol analysis using Wireshark & tcpdump for packet capture, filtering, dissection, and real-world pen testing scenarios.

June 9, 2023 · 9 min · UncleSp1d3r

Network Scanning and Enumeration - Tools and techniques

This article explores the importance of network scanning and enumeration in penetration testing and provides specific examples and tools used by penetration testers and red teams.

March 6, 2023 · 12 min · UncleSp1d3r

Using xfreerdp and Pass-the-Hash for RDP Connection

This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides real-world examples and limitations.

February 16, 2023 · 4 min · UncleSp1d3r

Tunneling Traffic through a Network: Techniques for Combining Iptables Port Bends, SSH Tunnels, and Netsh Port Proxies

This article explains how to tunnel traffic through a network using iptables port bends, SSH tunnels, and netsh port proxies.

February 15, 2023 · 9 min · UncleSp1d3r

Efficient Remote File Transfers: Using SCP and SSH with a Master Control Socket

In this article, we explored how to use SCP and SSH with a master control socket to streamline remote file transfers, improve efficiency, and maintain security for red teaming and penetration testing operations.

February 9, 2023 · 12 min · UncleSp1d3r

Port Scanning on Linux and Windows

This article explains how to perform port scanning on Linux and Windows using only built-in tools.

February 5, 2023 · 7 min · UncleSp1d3r