TATHAGATA ROYthreatradar.vercel.app·Sep 6, 2024HTB Noxious Walkthrough: LLMNR Poisoning & Network ForensicsIntroduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...Discuss·28 readsSecurity
Vansh Goelvanshgoel27.hashnode.dev·Aug 23, 2024Understanding Cybersecurity: A crucial Pillar of Digital AgeIn today's interconnected world, cybersecurity is more than just a technical term it's a critical necessity. As our reliance on digital platform grows, so do the threats posed by cybercriminals. Whether it's protecting sensitive data, maintaining pri...Discussdigitalsafety
Karim El Jamalijamali.hashnode.dev·May 1, 2024Cilium: Network PoliciesIntroduction to Network Policies In this blog episode, we're diving into the world of Kubernetes Network Policies. But before we get there, let's talk about the main headache these policies aim to fix. So, without Network Policies, Kubernetes lets Po...Discuss·1 like·2.5K readsKubernetes
Nilkanth Mistrynilkanth1010.hashnode.dev·Apr 11, 2024Day 37 - Mastering Kubernetes Interview Questions! 💡🚀What is Kubernetes and why it is important? 🚀 🌟 Kubernetes is an open-source container orchestration platform designed to automate the deployment, scaling, and management of containerized applications. It simplifies the management of complex appli...Discuss90 Days Of Devops ChallengesDevops
Tim Ngenotimngeno.hashnode.dev·Sep 30, 2023Network Sniffing with tcpdumpEver wondered how the internet, with all its memes, cat videos, and online shopping, keeps your credit card details or email passwords safe? That's all thanks to the magic of network security. Imagine a world where, every time you send a message or b...Discussnetworksecurity
Jitin Tyagijeetintyagi.hashnode.dev·Apr 23, 2023IPsec VPN: NAT Traversal (NAT-T)Overview of NAT-T feature NAT-T (Network Address Translation Traversal) is a feature of IPSec VPN that allows two endpoints to communicate with each other even if they are behind a NAT device. It works by encapsulating the IPSec packets in UDP pack...Discuss·11 likes·2.0K readsWeMakeDevs