"SYN" tag
The art of crafting

Cyber Attacks Explained: Packet Crafting

Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

It's concurrent servers time

The Socket API, Part 3: Concurrent Servers

In this part of the series, we will learn how to deal with multiple clients connected to the server. Welcome to another dose of socket programming! Till now, we’ve created servers that are…

Verify firewall security

Advanced Nmap: Scanning Firewalls Continued

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead to various vulnerabilities. Based on the scan results, several…

Firewall Scan

Advanced Nmap: Scanning Firewalls

After four articles on Nmap [1, 2, 3 & 4], which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion techniques, etc, it is time…

Advanced Nmap

Advanced NMap: Some Scan Types

A broad overview and the basic features of NMap have been covered in an earlier article in this series of articles on Nmap. In this article, we discuss in detail various NMap scan…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.