Given a scenario, analyze the results of a network reconnaissance. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 While gathering the reconnaissance about a network, the data must be turned into actionable information. The first type of analysis is the point in time analysis. Sources for such analysis may include packet captures, Netflow and […]
One of the first things both attackers and defenders do is to reconnoiter the network that they are attacking or defending. “Time spent on reconnaissance is seldom wasted.” – Duke of Wellington Arthur Wellesley. This is true in cybersecurity just like war. We must know what we’re defending if we have any hope of defending it.
The Problem Recently at work, we had an issue where one of our guest networks wasn’t allowing new hosts onto the network. After some investigation, it appeared that we had simply run out of available IP addresses in the DHCP pool. We added 100 addresses and thought we were done until we noticed that within […]
Security has always been an important component in being a Network Engineer. Today’s Internet of Things (IoT) and the growing number of cyber attacks has made it even more crucial. Because of this, I’ve decided to go back into the Security realm of certification coursework and exams. It has been over a decade since I […]