Syslog # Standard for message logging.
Severity Levels # Number Name Description 7 Debug Debug information 6 Information Informational messages 5 Notice Issues of concern that don’t represent a problem 4 Warning Issues that, if not addressed, could become a problem 3 Error Non-urgent errors that need to be addressed when possible 2 Critical Serious errors in secondary subsystem that should be addressed immediatly 1 Alert Serious errors in primary subsystem that should be addressed immediately 0 Emergency Errors that will cause the system to become unusable
tcpdump # Tutorials # https://danielmiessler.com/study/tcpdump/
Temporal Key Integrity Protocol (TKIP) is a security protocol used in the IEEE 802.11 wireless networking standard.
TKIP developed to replace WEP without requiring the replacement of legacy hardware. TKIP is no longer considered secure and was deprecated in 2012. Source: https://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol
The CIA Triad # Confidentiality Integrity Availability Confidentiality # Preventing unauthorized users from accessing data.
Passwords Encryption Access control Integrity # Ensuring the data hasn’t been altered.
Hashing Message authentication Availability # Making sure systems and data are available for authorized users.
Backups Redundant systems Disaster recovery plans These support fault tolerance and availability.
Segments packets for sending or reassembles packets. Uses ordered numbering system to organize the packets. Re-requests any packets that were corrupted in transfer.
Segmentation # Reassembly #
In IP-based computer networks, virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the router at the same time. One or more logical or physical interfaces may have a VRF and these VRFs do not share routes therefore the packets are only forwarded between interfaces on the same VRF. VRFs are the TCP/IP equivalent of a VLAN .
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2) .
Source: https://en.wikipedia.org/wiki/Virtual_LAN
Enables you to segment a physical network into multiple discreet networks without having additional hardware.
Create a VLAN by taking a single physical broadcast domain made up of one or more switches and chop it up into multiple broadcast domains. Requires switches with specific programming to create the virtual networks.
...
Wi-Fi (WiFi) # Wi-Fi is a family of wireless network protocols , based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves .
Most widely used type of network in the world Wikipedia - Wi-Fi
Wireless Network WiFi Encryption/Security # WEP WPS Wireless Networking Standards # _IEEE 802.11* standards_
Wireless Networking Standards
AKA IEEE 802.11 standards and specifications
Resources # Wikipedia - IEEE 802.11 Wireless Standards and Specifications # Specification 802.11a 802.11b 802.11g 802.11n 802.11ac 802.11ax Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz or 5 GHz 5 GHz 2.4 GHz or 5 GHz Maximum speed 54 Mbps 11 Mbps 54 Mbps 600 Mbps 1.3 Gbps 9.6 Gbps Maximum distance 100 ft 150 ft 150 ft 300 ft 150 ft 150 ft Channels (non-overlapped) 24 (24) 11 (3) 11 (3) 2.
...