-
Information Gathering
Learning Objectives Recommended tools Note: IP/domain shown below are for example purpose only . Step 1: Host Discovery – Ping sweep Perform a ping sweep (not a port scan) on the entire netblock and write…
-
Man-in-the-middle Attack
A Man-in-the-Middle (MitM) attack is a form of cyber attack where an attacker intercepts and potentially alters the communication between two parties without their knowledge. The attacker positions themselves between the communicating parties,…
-
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as ARP spoofing, is a network attack in which an attacker sends false (spoofed) Address Resolution Protocol messages to the local area network. The goal of…
-
MAC Flooding: Understanding the Attack
MAC flooding is a network attack that exploits the limitations of network switches by flooding the switch’s MAC address table. This attack aims to overload the table, causing the switch to operate in…
-
Find Device or IP Address using MAC Address
To find the device or IP address associated with a MAC (Media Access Control) address, you can use several methods depending on your network setup and tools available. Here are a few common…
-
AI Threat Modeling
AI threat modeling is a specialized approach to identifying and mitigating security threats and vulnerabilities in artificial intelligence (AI) systems. It focuses on understanding the unique risks associated with AI technologies, which can…