One of the most tedious jobs for the F5 Administrator is the periodic backup of the F5 BIG-IP system. F5 BIG-IQ does solve the problem but, this guide is for someone who…
Configuration of Remote High-Speed Logging in F5 BIG-IP
The scope of efficient logging systems provides a holistic view of the implemented systems and the logs generated by the WAF, especially the illegal and blocked requests help to discover the threats…
Get Microsoft Certified AZ-900 (Free-of-Cost)
If someone is really interested in getting into cloud computing, there is a way to get free verification from a well-recognized cloud vendor. Microsoft Certified: Azure Fundamentals can be a good place…
Email Security – How does it really work?
It’s safe to believe that almost all of us who are reading this blog, right now have used email at least once. Electronic mail, commonly known as email enables users to communicate…
What is a self-signed certificate, and why does one need it?
One may have heard at least heard once about the self-signed certificate working in the computer science domain. In short, a self-signed certificate is a digital certificate that is not signed by…
Visualization of F5 BIG-IP metrics on Grafana using Prometheus and Telemetry Streaming service
This user guide is all about configuration and deployment of telemetry streaming service on F5 BIG-IP device and scraps those metrics by Prometheus which will be finally visualized by the Grafana. One can…
Possible attacks by using Msvenom
Once the file developed using Msvenom is successfully executed into the victim’s computer then the following attacks can be performed by the attacker- in this case, Kali Linux 2020. At first, we…
Accessing the victim’s computer using the Msvenom
Before we begin the practical assessment of the attack by using Msvenom which is a Metasploit framework, we need to understand the actual work going behind the attack. We are trying to…
History of GSM Technology:
The major events of the GSM Technology Development from the early 1980s to the 2000s. During the early 1980s, in the cellular telecommunication sector, the analog cellular telephone system was exponentially growing…
what is SSL stripping method?
ssl stripping, is it a potential threat? How does it work and what are the precaution to avoid such an attack? SSL Stripping or SSL Downgrade Attack as the name implies is…