Objective You have been asked to implement your organization’s virtual networking infrastructure and test to ensure it is working correctly. In particular: Exercise 1: Create the virtual networking infrastructure Step 1: Type Virtual networks and press the Enter key and click + Create. Step 2: Fill in the details On the IP addresses tab ofContinue reading “Lab 2: Network Security Groups and Application Security Groups”
Tag Archives: Networking
Near Field Communication (NFC)
Near Field Communication, or NFC, is a short-range wireless communication technology that enables devices to interact with each other within a close proximity, typically within a few centimeters. It operates at a frequency of 13.56 MHz and can be used for various applications, such as contactless payment systems, secure access control, and data sharing between devicesContinue reading “Near Field Communication (NFC)”
HackTheBox – Precious
NMAP Scanning Add website to hosts file: Open the web service This website takes a web page URL and converts it into PDF. On examining the pdf, it shows that it is using pdfkit v0.8.6 version On searching we found vulnerability for mentioned version On studying the POC it looks like the URL parameter isContinue reading “HackTheBox – Precious”
Net Sec Challenge
What is the highest port number being open less than 10,000? 8080 There is an open port outside the common 1000 ports; it is above 10,000. What is it? 10021 How many TCP ports are open? 6 What is the flag hidden in the HTTP server header? THM{web_server_25352} What is the flag hidden in theContinue reading “Net Sec Challenge”
AWS Infrastructure as Code (IaC)
IaC allows you to write a script to provision AWS resources. The benefit is that you provision resources in a reproducible manner that saves time. CloudFormation CloudFormation allows you to provision AWS resources using IaC. Features: Provides a repeatable process for provisioning resources. Works with most AWS services. Create templates for the resources you wantContinue reading “AWS Infrastructure as Code (IaC)”
Machine Learning Services
Artificial Intelligence(AI) teaches computers to do things that normally require human intelligence. Some services: Rekognition Rekognition allows you to automate your image and video analysis. Features: Image and video analysis. Identify custom labels in images and videos. Face to text detection in images and videos. Comprehend Comprehend is a natural-language processing (NLP) service that findsContinue reading “Machine Learning Services”
AWS Database Services
Amazon Relational Database Service (RDS) RDS is a service that makes it easy to launch and manage relational databases. Features: Supports popular database engines. Offers high availability and fault tolerance using multi-AZ deployment. AWS manages the database with automatic software patching, automated backups, operating system maintenance, and more. Launch read replicas across Regions in orderContinue reading “AWS Database Services”
AWS Networking Services
Amazon Virtual Private Cloud (VPC) VPC is a foundational service that allows you to create a secure private network in the AWS cloud where you launch your resources. Features: Private virtual network. Launch resources like EC2 instances inside the VPC. Isolate and protect resources. A VPC spans Availability Zones in a Region. VPC peering allowsContinue reading “AWS Networking Services”
Content Delivery Service(CDN)
A CDN mechanism is used to deliver content quickly and efficiently based on geographic location. Note: Latency means the time it takes to respond to a request. Low latency is good! Amazon CloudFront CloudFront is a CDN that delivers data and applications globally with low latency. Features: Makes connections available globally or restricts them basedContinue reading “Content Delivery Service(CDN)”
OWASP Juice Shop
Day 1 Task – Injection Question #1: Log into the administrator account! Capture the request and change the parameters Click on send button See response in browser The token used is a jwt token which can be easily decoded from jwt.io After decoding you get the password Login with the credentials Here is your flag.Continue reading “OWASP Juice Shop”
