Learn Cyber Security.

Just another cyber security blog.

  • What is an IAVM? | DoD RMF

    The IAVM Notices are posted on a USCYBERCOM website and also entered into the Defense Information Systems Agency (DISA) operated Vulnerability Management System (VMS). IAVM is an acronym, which means Information Assurance Vulnerability Management. The IAVM publishes three types of alerts: IA Vulnerability Alerts (IAVA) address severe network vulnerabilities resulting in immediate and potentially severe…

  • What Is A Cross-layer function?

    Services that are not bound to a certain layer but may have an impact on multiple layers are known as cross-layer functions. All of the levels are involved in some orthogonal issues, such management and security. The confidentiality, integrity, and availability of the sent data are improved by these services. In reality, cross-layer functions are…

  • Redeemer Walkthrough | HackTheBox

    This is a simple walkthrough for completing the Redeemer target machine on Hackthebox.com. Redeemer Walkthrough Task 1 Question: Which TCP port is open on the machine? Answer: 6379 Redeemer Walkthrough Task 2 Question: Which service is running on the port that is open on the machine? Answer: Redis Redeemer Walkthrough Task 3 Question: What type…

  • Cross-layer functions | OSI Model

    Cross-layer functions are services that are not tied to a given layer but may affect more than one layer. Some orthogonal aspects, such as management and security, involve all of the layers. These services are aimed at improving the CIA triad—confidentiality, integrity, and availability—of the transmitted data. Cross-layer functions are the norm, in practice, because…

  • 7 Layers of OSI Model Explained

    The 7 layers of the OSI model describe how computer systems communicate over a network. Understanding the functions and responsibilities of each layer will help you understand how network communications function. The development of the OSI model started in the late 1970s to support the emergence of diverse computer networking methods, such as the current…

  • Archetype Walkthrough | HackTheBox

    This is a simple walkthrough for completing the Archetype target machine in Hackthebox.com. Task 1 Question: Which TCP port is hosting a database server? Answer: 1433 Task 2 Question: What is the name of the non-Administrative share available over SMB? Answer: backups Task 3 Question: What is the password identified in the file on the…