Task 1 - Reviewing the history and structure of the OSI model The Open Systems Interconnection (OSI) model was originally published in 1984 by the International Organization of Standardization (ISO) and the International Telecommunications Union (ITU-T). It was used to standardize networking protocols allowing for interoperability of vendor equipment. The OSI model defines seven layers: … Continue reading Introduction to the OSI Model Exercise 1 – Understand the OSI model
Author: Gray
Introduction to the OSI Model Lab Topology
Figure 1.0 Lab Topology - The lab topology is composed of two subnets separated by an Ubuntu device called PLABRTR01 functioning as a router. The first subnet contains three computers. The first, called PLABDC01 is a Windows 2016 Server with an IP address of 192.168.0.2/24 and functions as the Domain Controller. The second, called PLABSA01 … Continue reading Introduction to the OSI Model Lab Topology
Lap 01. Open Source Information Gathering using Windows Command Line Utilities. (Updating…)
Windows offers several powerful command line utilities that help attackers as well as ethical hackers and pen testers to gather open source information about target of the evaluation. Lab ObjectivesThis lab demonstrates how to use ping, nslookup, and tracert utilities to gather information about a target. The lab teaches how to:1. Use ping utility to … Continue reading Lap 01. Open Source Information Gathering using Windows Command Line Utilities. (Updating…)
1. SETTING UP YOUR DEVELOPMENT ENVIRONMENT
Before you can experience the art of gray hat Python programming, you must work through the least exciting portion of this book, setting up your development environment. It is essential that you have a solid development environment, which allows you to spend time absorbing the interesting information in this book rather than stumbling around trying … Continue reading 1. SETTING UP YOUR DEVELOPMENT ENVIRONMENT
GRAY HAT PYTHON – INTRODUCTION
I learned Python specifically for hacking—and I’d venture to say that’s a true statement for a lot of other folks, too. I spent a great deal of time hunting around for a language that was well suited for hacking and reverse engineering, and a few years ago it became very apparent that Python was becoming … Continue reading GRAY HAT PYTHON – INTRODUCTION
Chapter 1. Making Paper Cryptography Tools
Before we start writing cipher programs, let’s look at the process of encrypting and decrypting with just pencil and paper. This will help you understand how ciphers work and the math that goes into producing their secret messages. In this chapter, you’ll learn what we mean by cryptography and how codes are different from ciphers. … Continue reading Chapter 1. Making Paper Cryptography Tools
Chapter 1. Introduction to algorithms / 3
Running time Any time I talk about an algorithm, I’ll discuss its running time. Generally you want to choose the most efficient algorithm whether you’re trying to optimize for time or space. Back to binary search. How much time do you save by using it? Well, the first approach was to check each number, one … Continue reading Chapter 1. Introduction to algorithms / 3
Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera
The First Four Steps Testing an Algorithm for a Numerical Sequence In this video, we're going to test the algorithm that we just wrote. We're going to be counting from zero to N and N as a variable. We're going to draw boxes for each of our variables to keep track of what value they currently have as … Continue reading Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera
Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera
The First Four Steps Step 1: Work an Example Yourself The first step in trying to design an algorithm is to work at least one instance of the problem—picking specific values for each parameter—yourself (by hand). Often this step will involve drawing a diagram of the problem at hand, in order to work it precisely. … Continue reading Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera
Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera
How to Write a Program with the Seven Steps Why You Should Learn to Program Stepping Through An Algorithm Let us briefly take a look at an example algorithm, and how you might follow its steps yourself. We don't need to know anything about programming to do these steps, we just need to be able to do some … Continue reading Introduction to Programming in C Specialization – Duke University / Programming Fundamentals/ Week 1 / Coursera