This commit is contained in:
stephensottosanti
2021-03-07 23:03:51 -06:00
parent 7fd25253c5
commit b9683dfcc8
4 changed files with 15 additions and 3 deletions

View File

@@ -1,4 +1,5 @@
# Code-Breaking and Decoding
[BACK TO UACTF](/UACTF)<br>
Having the ability to interpret and understand data even if it is presented in a different or unknown format is extremely important to conducting cyber security examinations and to the general understanding of cyber security. A coded message is simply a message that has been changed in some way so as to hide its meaning from prying eyes. <br>
@@ -20,3 +21,5 @@ Encryption is different from encoding as encoded messages do not require secret
[How to Make Your Data Safe Using Cryptography](https://www.guru99.com/how-to-make-your-data-safe-using-cryptography.html) <br>
[Cryptography - KhanAcademy](https://www.khanacademy.org/computing/computer-science/cryptography) <br>
[BACK TO UACTF](/UACTF)<br>

View File

@@ -1,4 +1,5 @@
# File Analysis
[BACK TO UACTF](/UACTF)<br>
File analysis and understanding is one aspect of the larger field of Digital Forensics. Digital Forensics encompasses the investigation of data found on digital devices and involves preserving, identifying, extracting, documenting and interpreting this data. <br>
@@ -16,4 +17,6 @@ One of the more interesting items that occur during an investigation is when a s
<p align="center">
<img width="450px" src="00_Archive/images/filesignatures.png" alt="FileSignatures"/>
</p>
</p>
[BACK TO UACTF](/UACTF)<br>

View File

@@ -1,4 +1,5 @@
# Network Traffic Analysis
[BACK TO UACTF](/UACTF)<br>
Network traffic analysis begins by understanding the components of network communication. In this context, it will be key to understand the components of network
packets in addition to having the ability to capture, filter, and interpret traffic. Wireshark is very good at packet capture and protocol analysis and is one of the better tools for helping with understanding of network traffic. <br>
@@ -32,4 +33,6 @@ information. <br>
<p align="center">
<img width="500px" height="450px" src="/00_Archive/images/headerformat.png" alt="hf1"/>
<img width="500px" height="450px" src="/00_Archive/images/headerformat2.png" alt="hf2"/>
</p>
</p>
[BACK TO UACTF](/UACTF)<br>

View File

@@ -1,4 +1,5 @@
# Website Security
[BACK TO UACTF](/UACTF)<br>
One of the most overlooked aspects of the corporate environment is the health and security of the company website. Far too often it is not until after a security breach has occurred that investments in website security practices are made. To protect the security of the website, one needs to be proactive with a defensive mindset. <br>
@@ -21,4 +22,6 @@ Number seven on the list is another very common vulnerability, Cross-Site Script
Below is a tutorial on Cross-Site Scripting. <br>
https://excess-xss.com/
https://excess-xss.com/
[BACK TO UACTF](/UACTF)<br>