commit
This commit is contained in:
@@ -1,4 +1,5 @@
|
||||
# Code-Breaking and Decoding
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
|
||||
Having the ability to interpret and understand data even if it is presented in a different or unknown format is extremely important to conducting cyber security examinations and to the general understanding of cyber security. A coded message is simply a message that has been changed in some way so as to hide its meaning from prying eyes. <br>
|
||||
|
||||
@@ -20,3 +21,5 @@ Encryption is different from encoding as encoded messages do not require secret
|
||||
|
||||
[How to Make Your Data Safe Using Cryptography](https://www.guru99.com/how-to-make-your-data-safe-using-cryptography.html) <br>
|
||||
[Cryptography - KhanAcademy](https://www.khanacademy.org/computing/computer-science/cryptography) <br>
|
||||
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
@@ -1,4 +1,5 @@
|
||||
# File Analysis
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
|
||||
File analysis and understanding is one aspect of the larger field of Digital Forensics. Digital Forensics encompasses the investigation of data found on digital devices and involves preserving, identifying, extracting, documenting and interpreting this data. <br>
|
||||
|
||||
@@ -16,4 +17,6 @@ One of the more interesting items that occur during an investigation is when a s
|
||||
|
||||
<p align="center">
|
||||
<img width="450px" src="00_Archive/images/filesignatures.png" alt="FileSignatures"/>
|
||||
</p>
|
||||
</p>
|
||||
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
@@ -1,4 +1,5 @@
|
||||
# Network Traffic Analysis
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
|
||||
Network traffic analysis begins by understanding the components of network communication. In this context, it will be key to understand the components of network
|
||||
packets in addition to having the ability to capture, filter, and interpret traffic. Wireshark is very good at packet capture and protocol analysis and is one of the better tools for helping with understanding of network traffic. <br>
|
||||
@@ -32,4 +33,6 @@ information. <br>
|
||||
<p align="center">
|
||||
<img width="500px" height="450px" src="/00_Archive/images/headerformat.png" alt="hf1"/>
|
||||
<img width="500px" height="450px" src="/00_Archive/images/headerformat2.png" alt="hf2"/>
|
||||
</p>
|
||||
</p>
|
||||
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
@@ -1,4 +1,5 @@
|
||||
# Website Security
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
|
||||
One of the most overlooked aspects of the corporate environment is the health and security of the company website. Far too often it is not until after a security breach has occurred that investments in website security practices are made. To protect the security of the website, one needs to be proactive with a defensive mindset. <br>
|
||||
|
||||
@@ -21,4 +22,6 @@ Number seven on the list is another very common vulnerability, Cross-Site Script
|
||||
|
||||
Below is a tutorial on Cross-Site Scripting. <br>
|
||||
|
||||
https://excess-xss.com/
|
||||
https://excess-xss.com/
|
||||
|
||||
[BACK TO UACTF](/UACTF)<br>
|
||||
Reference in New Issue
Block a user