BestInternetSecurity.net

Information Security Resources

Entries for the ‘Network Security’ Category

Google Hacking and Buffer Overflow Attacks: In the News

Recently I spotted a piece of news about a type of network attack combining techniques we have discussed in recent articles involving Google Hacking and Buffer Overflow Attack . The incident, according to Forbes News1 involves “using Google searches to track down sites vulnerable to so-called ‘SQL injections’.” Essentially, the hackers use Google to hunt […]

Comments (2)

DNS Root Servers’ Attack: Is it possible?

The Domain Name System (DNS) relies on a hierarchical database system. At the top of this system sit thirteen root servers with names following the format letter.root-servers.net, where the letter ranges from A to M. Many people mistakenly assume that there are only 13 root servers in the world. In fact, each root server notation […]

Comments (1)

Trojan Horse – What is it?

What does the name Trojan Horse imply in way of network security, and what threats do Trojan Horses bring to a network computing system? First let’s look at history to understand the name “Trojan Horse.” The Trojan War, as you may already know, is the ancient war between the Greeks and the city of Troy […]

Leave a Comment

RADIUS AAA Servers

What are RADIUS AAA Servers? According to Convery, S.(2007)1: “RADIUS was developed by Livingston Enterprises (now part of Alcatel-Lucent) in the early 1990s, became an Internet standard through the IETF in 1997, and today is the most widely accepted AAA protocol. Another widely adopted AAA protocol, which predates RADIUS as an RFC by four years, […]

Leave a Comment

PPTP port: How PPTP Works

PPTP port belong to Point-to-Point Tunneling Protocol (PPTP). PPTP is a method for implementing virtual private networks that works on the data link layer. It serves the purpose of encrypting a remote computer’s network traffic to a host using Point-to-Point Protocol’s (PPP’s) authentication methods of PAP (Password Authentication Protocol) or CHAP (Challenge-Handshake Authentication Protocol). It […]

Leave a Comment

DNS – Domain name system security issues

Domain Name System (DNS) is the magical ability of Internet hosts to translate the machine-readable IP address numbers like 216.109.112.135 to something meaningful to humans, like www.yahoo.com. A sophisticated hierarchical database system in the Internet is required to accomplish this task. One of the core components of that system is the DNS server, which serves […]

Leave a Comment

TCP/IP Protocol: Why It is Not Secure

TCP/IP (Transmission Control Protocol / Internet Protocol) is a set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. However, from a security standpoint, it is not inherently secure. To understand why, we must first look at the history of TCP/IP. TCP/IP was designed more than 30 […]

Comments (1)