1. Introduction to Web Application In this section, we’ll talk about common security threads. We’ll also discuss the Sam’s event management errors. We’ll discuss the progression of a professional hacker, the anatomy of a Web application attack. We’ll discuss Web application attack techniques. We’ll discuss components of a generic Web application system, URL mappings to […]
1. Completion Okay, so let’s wrap up. In the first part, we talk about network technologies and this includes layer one to layer four of the OSI model like switching and routing concepts, IP addressing and subnetting transport layers such as TCP and UDP protocols. We also talk about Dhcp and network address transport. Part […]
15. Domain Name Service (DNS) Part 1 Domain name system or DNS. This is an application that listens to port 53 on both TCP and UDP transport. The primary goal for this application is to convert names to IP address. Because we as humans, we remember names better than bunch of numbers. And the example […]
10. Transport Layer Security (TLS) / Secured Socket Layer (SSL) Part 4 Digital certificate, public key certificate or identity certificate. This is an electronic document used to prove the ownership of a public key. This is also the information about the identity of its owner which is called subject. This is most of the time […]
1. Hypertext Transfer Protocol (HTTP) Part 1 We’ve already discussed the lower layers of our OSI model, presentation, datalink network and transport Layer before we talk about Http, let’s discuss first the upper layer of our OSI model and these three upper layers session, presentation and application is consolidated into just one layer for the […]
5. Hypertext Transfer Protocol (HTTP) Part 5 Now we’re going to modify our lab topology and this time we’re not going to use our F five big IP device because we want to communicate directly to the web servers. As we have here. We have the two network, we have the external where our client […]
19. BIG-IP Troubleshooting Part 1 After troubleshooting connectivity issues layer one, layer two, layer three and application related issues, let’s troubleshoot our Fybig IP device. Now, what I have here is just a simple connectivity. We have our client PC connected to our FY big IP via the management network and the reason why is […]
14. HTTP Troubleshooting Part 1 Now let’s move to application connection networks. What I have here is a server, but this time it’s not listening to port 80, it’s listening to port four four three. And it is added to a pool named S underscore pool one. It’s only one pool number and this pool […]
10. Layer 2 Connectivity Issues Part 5 Common layer two Issues and Best Practices it is very common to experience misconfiguration at layer two. Sometimes it’s related to Vlan. You should configure Vlan ten on this particular network device, but accidentally you configured Vlan Eleven, or sometimes it is related to eight two one Q […]
6. Layer 2 Connectivity Issues Part 1 Now let’s troubleshoot layer connectivity issues. In our diagram, we have three servers, and each servers are residing in three different Vlans. We have server one in vlan ten with an IP address of 172 1610 one, server two in Vlan 20 with an IP address of 22, […]