F5 101 – Application Delivery Controller (ADC) Part 4

Configuring Persistence Part 1 I’m back in our M five big IP GUI and we’re going to do some lab demonstration for our source address persistence under local traffic. I will select virtual servers, virtual server list and let’s hit Http underscore vs. Let’s verify the destination. Ten one, 10, listening on port 80. As I scroll down, you will see there’s not much of the configuration because we accepted most of the defaults. Now, if I hit the resource tabs, you will see that default pool is associated to…

F5 101 – Application Delivery Controller (ADC) Part 3

Profiles Part 3 We use profile to learn and to affect the behavior of certain types of network traffic. Profile is also a configuration object that contains settings with values for not only learning but also controlling the behavior of network and application. There are many any jobs of profile. We have the application services, these are Http, FTP, DNS and many more. Profile can also run in layer for protocols such as TCP and UDP. Profiles can also run on triple A server such as LDAP and Active Directory….

F5 101 – Application Delivery Controller (ADC) Part 2

Configuring Heatlh Monitors Part 1 I’m here in our f five GUI and I have two tabs. The first one is dedicated for pool and monitor configuration. The second tab will be dedicated for Network Map so we can monitor the status of our objects easier. So under local traffic I’m going to click Network Map and as you can see we have two applications. The first one is an Http application. We have three pool members added in our pool that is associated to the Vs. We also have…

F5 101 – Application Delivery Controller (ADC)

Configuring Load Balancing in ADC Part 2 Before we talk about load balancing, concepts, methods and its configuration, let’s talk about first the terminology that we’ll be using. We have here three servers with an IP address of 170, 216, 21, dot two and three. These three servers are connected to to internal VLAN. Big IP is also connected to the internal VLAN. Now, in F five world, an IP address of a server. This is what we called Notes. Again, if we’re just talking about IP addresses, we call…

EC-Council CEH 312-50 v10 – Linux Overview

Introduction to Linux In this section we’ll discuss Linux history. We’ll discuss Linus plus. Good. We’ll discuss the Linux GUI desktops as well as a bass shell. We’ll also discuss file formats. We’ll give you a couple demos on account management. We’ll discuss crates and zips. We’ll talk about some vulnerabilities like the shellshock and Poodle as well as our most popular distros like security distros such as Kali Linux. Linux History – Linus + Minux = Linux So starting off our section on Linux, let’s just talk a little…

EC-Council CEH 312-50 v10 – FootPrinting – Reconnaissance and Information Gathering

Instructor Demo: GoogleAlerts In this lecture demo, we’re going to be talking about the Google Hacking database that Johnny Long put into the public domain. So let’s go ahead and take a look at that. Right now I’m going to go ahead and open up a browser and I just simply went to a web page in the browser and let me go ahead and just grab in here and I’m just going to type in Google hacking database. And you can naturally see a large number of people that…

EC-Council CEH 312-50 v10 – FootPrinting – Reconnaissance and Information Gathering Part 2

DNS Databases Okay, so the next thing we want to talk about is the DNS server itself and more specifically the record types that it holds because they do hold a bit of information. I briefly went through some of them, but we’re going to go ahead and elaborate on them just a little bit more. Now as you can see here, the host record or the A record, which is what you’ll typically see in a DMs, a DNS dump is it maps a domain name to an IP…

EC-Council CEH 312-50 v10 – Enumernation – What Can We Get For Free?

Intro to Enumeration In this section we’ll discuss the definition of enumeration. We’ll discuss grabbing banners, shot in zone transfers, DNS enumeration SNP enumeration and countermeasures null sections. Net BIOS compatible machines as well. Grabbing Banners Now, the first thing we want to talk about in our enumeration chapter is grabbing banners. And grabbing banners is a very common technique because most pieces of software will provide a banner to the client so they know how to configure themselves to be able to make a request. Now the hacker is…

EC-Council CEH 312-50 v10 – Detecting Live Systems – Port Scanning

Introduction to Port Scanning In this section, we’ll discuss port scanning. We’ll give you an intro into port scanning. The TCP IP Stack the TCP Three Step Startup Sequence port scanning Types port scanning tools OS Fingerprinting, Fuzzy Logic and Countermeasures. Introduction to Port Scanning In this introduction to port scanning, we know that scanning is a method for discovering exploitable communication channels. In most network services and programs in use today, they run over TCP IP, which is a network protocol actually designed by an organization called DARPA, part…

EC-Council CEH 312-50 v10 – Cryptography

Intro Into Cryptography In this section, we’ll discuss cryptography. Actually, one of my favorite sections of the entire course. We’ll discuss its implementations. Stream ciphers, block ciphers, the Enigma machine. We’ll discuss asymmetric encryption, hybrid encryption. We’ll compare the two as well as their strength. We’ll look at key exchanges, hashing collisions, common hash algorithms. We’ll discuss ransomware, IPsec as a age, PKI applications, quantum cryptography and Vera quipped. Beginings of Cryptography Encryption has been around a very long time, even since the Roman times. Caesar himself is actually credited…

img