Lester Obbayi, Author at Security Boulevard

Web server protection: Web server security monitoring

Introduction Web server security is important in ensuring the correct operation of your websites. It allows you to identify vulnerabilities and any other security issues found to exist within the web... Go on to the site to read the full article ... Read More

Web server security: Active defense

Introduction Active defense is an approach taken to prevent attacks from adversaries. In this article, we discuss the various active defenses and countermeasures that can be enforced in an attempt to... Go on to the site to read the full article ... Read More

Ethical hacking: TCP/IP for hackers

| | TCP/IP for Hackers
Introduction In this article, we’ll discuss TCP/IP: the importance of mastering it and how this mastery can be beneficial to hackers. We will then look at how hackers are able to attack TCP/IP and... Go on to the site to read the full article ... Read More

Web server protection: Web application firewalls for web server protection

Introduction Firewalls are an integral part of the tools necessary in securing web servers. In this article, we will discuss all relevant aspects of web application firewalls. We’ll explore a few... Go on to the site to read the full article ... Read More
Web server security: Command line-fu for web server protection

Web server security: Command line-fu for web server protection

Introduction Adequate web server security requires proper understanding, implementation and use of a variety of different tools. In this article, we will take a look at some command line tools that... Go on to the site to read the full article ... Read More

Ethical hacking: SNMP recon

| | SNMP Recon
Introduction In this article, we will discuss the various methods one could take to perform reconnaissance on the SNMP protocol. As you may know, SNMP reveals too much information about targets that... Go on to the site to read the full article ... Read More

Ethical hacking: Stealthy network recon techniques

Introduction In this article, we shall discuss some stealthy reconnaissance techniques that should be employed during a hacking exercise. It’s important to know which scan to use, especially when you... Go on to the site to read the full article ... Read More
Ethical hacking: Top privilege escalation techniques in Windows

Ethical hacking: Top privilege escalation techniques in Windows

Introduction In this article, we will discuss the top techniques that hackers use today when performing privilege escalation within Windows machines. Where necessary, we shall give examples of the... Go on to the site to read the full article ... Read More

Network traffic analysis for IR: Basic protocols in networking

Introduction In this article, we’ll discuss some of the basic protocols that are commonly used in computer networking. A good understanding of computer networking is required by fresh hackers in... Go on to the site to read the full article ... Read More

Network traffic analysis for IR: Introduction to networking

Introduction Computer networking is one of the most important skills that incident responders are required to have. Analyzing network traffic as an incident responder is about more than just noting... Go on to the site to read the full article ... Read More