83. SaaS & SaaS The final topic in this section is “software as a service.” So far what we have studied that inside infrastructure structure as a service the provider responsibility is up to virtualization say in the platform as a service the provider responsibility is to provide up to infrastructure software and finally inside […]
78. Around the Corner Agile, Cloud-Scale Applications, and DevOps This is the last topic in this particular section. Around the corner, Zale cloudscape application and devil. This is nothing, but you can see the waterfall model that we studied in our, say, engineering career or maybe in BCA. We have this particular model where we […]
73. 1.6 Starts… Now we reach to section one six analyze cloud service deployment model NISD 801 four five. Now, if you want the detailed document related to this NIST 801-4-5, you can do a little bit of Googling and you will get the cloud-related NIST document. I have taken a snapshot here, and you […]
68. Valant Encapsulation The next important topic is We have VXLAN encapsulation. Now let’s understand that VXLAN Encapsulation means that you have your Inner Header means obviously the payload and the Inner Header where you have the excuse source and destination then we have the VXLAN Header, UDPHeader and then the Outer Header. Now, inside […]
63. Describe Resolution & Deployment immediacy So let’s try to understand this resolution, this deployment immediacy, and other factors lab related to this. You will see in the next section—that’s four, three. Now, what’s the key concept and have the diagram as well. So from there, you will understand it 100%. The key concept here […]
58. ACI Bring up process Theory part 01 Let us discuss the ACI bring up process, and you can see the various steps here while we are doing the ACI bring up. First of all, we should connect all these Leaf spines and the Epic controllers. So all the equipment has been racked and stacked. […]
1. Meterpreter Basics In today’s lecture, we’re going to learn some basics about how to interact with Metasploit’s meterpreter. So I already have a session here, and as you can see, it just says “meterpreter” in Linux, and the help command is always the best command you can run in any command line. So the […]
1. Ex1 – Generating a Backdoor That Works Outside The Network So far in the course, we have learned a number of methods to gain access to computers. We learned how to do that using server-side attacks, client-side attacks, and social engineering. We tested everything, though, within our own network, just to simplify things. That […]
11. Email Spoofing – Method 2 In the previous lecture, we saw how to use an SMTP server to spoof emails and make them appear like they’re sent from any other email address we want. I also mentioned in the previous lecture that there is another way of doing this, and that is by using […]
6. Backdooring Any File Type (images, pdf’s …etc) In this lecture, I’d like to show you how to combine the backdoor that we created before with any other file type so that when executed, it will display an image, a PDF, a song, or something else that the target person is interested in. You’ll be […]