What is cross-site scripting (XXS)? Cross-site scripting (XSS) is a web security vulnerability that allows an attacker to compromise user interactions with a vulnerable application. It allows an attacker to get around the same-origin policy, which is intended to keep websites separate from one another. Cross-site scripting vulnerabilities allow the attacker to imitate a victim […]
In this blog, we will see how we can upgrade the Fortinet firewall with format and upgrade process, usually, to upgrade the Fortinet devices there is always a specific upgrade path that has to be followed each and every time but the procedure which we are going to see also an official procedure to upgrade […]
As we know In Air-Gapped Network has no internet connectivity, and all the communication takes place between sites and devices using private IP addresses. If we want to update or install any package on a Linux machine it is not a big hurdle for us, if the machine is connected to the Internet. But suppose, […]
What is Fail-Over? The meaning of the word “Fail-Over” is a procedure by which a system automatically transfers control to a duplicate system when it detects a fault or failure and in this blog, we will know about how it is in Cisco ASA. So, when an ASA {Adaptive Security Appliance} due to any reason […]
In this blog, we will learn about Network Address Translation (NAT) and its types, before we move forward into more details, let us understand what NAT exactly means? What Is NAT Converting an IP address into any other IP which is reachable with the destination network. NAT is used to provide communication between that network […]
Border Gateway Protocol (BGP) is an exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the internet. Among multiple autonomous systems, BGP is used for choosing the best route for a packet from source to destination. In an earlier blog, we have discussed what is BGP and why we […]
What is LSA? LSA stands for Link State Advertisement. Each router makes a database table in which it keeps LSA. The router then runs SPF (shortest path first) algorithm on the database table and generates a routing table. In this blog, we will learn about how many types of LSA are present in OSPF. Types […]
In the last blog, we discussed STP and how it works, types of topology change, and their effect on the network. In this, we will explain what different mechanisms are to protect STP. Types of mechanisms to protect STP are as follows: – Root Guard Loop Guard BPDU Guard BPDU Filter UDLD Root Guard It […]
In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
Session Hijacking Session hijacking can be done when a user session is hijacked by the hacker when he is currently logged in and lose control of the session, then the hacker can easily steal their personal data, bank details whenever a user starts a session and log in into bank websites. While hijacking a session […]